blob: 0eaabe5c3fecafd090a80483f36e44dac95c1a47 [file] [log] [blame]
Christopher Faulet47596d32018-10-22 09:17:28 +02001/*
2 * Functions to manipulate HTTP messages using the internal representation.
3 *
4 * Copyright (C) 2018 HAProxy Technologies, Christopher Faulet <cfaulet@haproxy.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
Christopher Faulet5031ef52020-01-15 11:22:07 +010012#include <sys/types.h>
13#include <sys/stat.h>
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +020014#include <ctype.h>
Christopher Faulet5031ef52020-01-15 11:22:07 +010015#include <fcntl.h>
16#include <unistd.h>
17
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020018#include <haproxy/api.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020019#include <haproxy/arg.h>
Willy Tarreau6be78492020-06-05 00:00:29 +020020#include <haproxy/cfgparse.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020021#include <haproxy/global.h>
Willy Tarreau5413a872020-06-02 19:33:08 +020022#include <haproxy/h1.h>
Willy Tarreaucd72d8c2020-06-02 19:11:26 +020023#include <haproxy/http.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020024#include <haproxy/http_fetch.h>
Willy Tarreau87735332020-06-04 09:08:41 +020025#include <haproxy/http_htx.h>
Willy Tarreau16f958c2020-06-03 08:44:35 +020026#include <haproxy/htx.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020027#include <haproxy/log.h>
28#include <haproxy/regex.h>
29#include <haproxy/sample.h>
Willy Tarreau4cbf62d2021-05-08 13:01:23 +020030#include <haproxy/tools.h>
Christopher Faulet47596d32018-10-22 09:17:28 +020031
Christopher Faulet47596d32018-10-22 09:17:28 +020032
Christopher Fauletf7346382019-07-17 22:02:08 +020033struct buffer http_err_chunks[HTTP_ERR_SIZE];
Christopher Faulet1b13eca2020-05-14 09:54:26 +020034struct http_reply http_err_replies[HTTP_ERR_SIZE];
35
Christopher Faulet58857752020-01-15 15:19:50 +010036struct eb_root http_error_messages = EB_ROOT;
Christopher Faulet35cd81d2020-01-15 11:22:56 +010037struct list http_errors_list = LIST_HEAD_INIT(http_errors_list);
Christopher Faulet5809e102020-05-14 17:31:52 +020038struct list http_replies_list = LIST_HEAD_INIT(http_replies_list);
Christopher Fauleta7b677c2018-11-29 16:48:49 +010039
Christopher Faulet76edc0f2020-01-13 15:52:01 +010040/* The declaration of an errorfiles/errorfile directives. Used during config
41 * parsing only. */
42struct conf_errors {
43 char type; /* directive type (0: errorfiles, 1: errorfile) */
44 union {
45 struct {
46 int status; /* the status code associated to this error */
Christopher Faulet5809e102020-05-14 17:31:52 +020047 struct http_reply *reply; /* the http reply for the errorfile */
Christopher Faulet76edc0f2020-01-13 15:52:01 +010048 } errorfile; /* describe an "errorfile" directive */
49 struct {
50 char *name; /* the http-errors section name */
51 char status[HTTP_ERR_SIZE]; /* list of status to import (0: ignore, 1: implicit import, 2: explicit import) */
52 } errorfiles; /* describe an "errorfiles" directive */
53 } info;
54
55 char *file; /* file where the directive appears */
56 int line; /* line where the directive appears */
57
58 struct list list; /* next conf_errors */
59};
60
Christopher Faulet297fbb42019-05-13 14:41:27 +020061/* Returns the next unporocessed start line in the HTX message. It returns NULL
Christopher Faulet29f17582019-05-23 11:03:26 +020062 * if the start-line is undefined (first == -1). Otherwise, it returns the
Christopher Faulet297fbb42019-05-13 14:41:27 +020063 * pointer on the htx_sl structure.
Christopher Faulet47596d32018-10-22 09:17:28 +020064 */
Tim Duesterhusb8ee8942021-04-03 20:39:20 +020065struct htx_sl *http_get_stline(const struct htx *htx)
Christopher Faulet47596d32018-10-22 09:17:28 +020066{
Christopher Faulet297fbb42019-05-13 14:41:27 +020067 struct htx_blk *blk;
Christopher Faulet573fe732018-11-28 16:55:12 +010068
Christopher Faulet29f17582019-05-23 11:03:26 +020069 blk = htx_get_first_blk(htx);
Christopher Fauleta7d6cf22021-04-15 10:25:35 +020070 if (!blk || (htx_get_blk_type(blk) != HTX_BLK_REQ_SL && htx_get_blk_type(blk) != HTX_BLK_RES_SL))
Christopher Faulet297fbb42019-05-13 14:41:27 +020071 return NULL;
72 return htx_get_blk_ptr(htx, blk);
Christopher Faulet47596d32018-10-22 09:17:28 +020073}
74
Christopher Faulet727a3f12020-02-07 16:39:41 +010075/* Returns the headers size in the HTX message */
76size_t http_get_hdrs_size(struct htx *htx)
77{
78 struct htx_blk *blk;
79 size_t sz = 0;
80
81 blk = htx_get_first_blk(htx);
82 if (!blk || htx_get_blk_type(blk) > HTX_BLK_EOH)
83 return sz;
84
85 for (; blk; blk = htx_get_next_blk(htx, blk)) {
86 sz += htx_get_blksz(blk);
87 if (htx_get_blk_type(blk) == HTX_BLK_EOH)
88 break;
89 }
90 return sz;
91}
92
Christopher Faulet8dd33e12020-05-05 07:42:42 +020093/* Finds the first or next occurrence of header matching <pattern> in the HTX
94 * message <htx> using the context <ctx>. This structure holds everything
95 * necessary to use the header and find next occurrence. If its <blk> member is
96 * NULL, the header is searched from the beginning. Otherwise, the next
97 * occurrence is returned. The function returns 1 when it finds a value, and 0
98 * when there is no more. It is designed to work with headers defined as
99 * comma-separated lists. If HTTP_FIND_FL_FULL flag is set, it works on
100 * full-line headers in whose comma is not a delimiter but is part of the
101 * syntax. A special case, if ctx->value is NULL when searching for a new values
102 * of a header, the current header is rescanned. This allows rescanning after a
103 * header deletion.
104 *
105 * The matching method is chosen by checking the flags :
106 *
107 * * HTTP_FIND_FL_MATCH_REG : <pattern> is a regex. header names matching
108 * the regex are evaluated.
109 * * HTTP_FIND_FL_MATCH_STR : <pattern> is a string. The header names equal
110 * to the string are evaluated.
111 * * HTTP_FIND_FL_MATCH_PFX : <pattern> is a string. The header names
112 * starting by the string are evaluated.
113 * * HTTP_FIND_FL_MATCH_SFX : <pattern> is a string. The header names
114 * ending by the string are evaluated.
115 * * HTTP_FIND_FL_MATCH_SUB : <pattern> is a string. The header names
116 * containing the string are evaluated.
Christopher Faulet47596d32018-10-22 09:17:28 +0200117 */
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200118
119#define HTTP_FIND_FL_MATCH_STR 0x0001
120#define HTTP_FIND_FL_MATCH_PFX 0x0002
121#define HTTP_FIND_FL_MATCH_SFX 0x0003
122#define HTTP_FIND_FL_MATCH_SUB 0x0004
123#define HTTP_FIND_FL_MATCH_REG 0x0005
124/* 0x0006..0x000f: for other matching methods */
125#define HTTP_FIND_FL_MATCH_TYPE 0x000F
126#define HTTP_FIND_FL_FULL 0x0010
127
128static int __http_find_header(const struct htx *htx, const void *pattern, struct http_hdr_ctx *ctx, int flags)
Christopher Faulet47596d32018-10-22 09:17:28 +0200129{
130 struct htx_blk *blk = ctx->blk;
131 struct ist n, v;
132 enum htx_blk_type type;
Christopher Faulet47596d32018-10-22 09:17:28 +0200133
134 if (blk) {
135 char *p;
136
Tim Duesterhused526372020-03-05 17:56:33 +0100137 if (!isttest(ctx->value))
Christopher Faulet47596d32018-10-22 09:17:28 +0200138 goto rescan_hdr;
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200139 if (flags & HTTP_FIND_FL_FULL)
Christopher Faulet47596d32018-10-22 09:17:28 +0200140 goto next_blk;
141 v = htx_get_blk_value(htx, blk);
Tim Duesterhus77508502022-03-15 13:11:06 +0100142 p = istend(ctx->value) + ctx->lws_after;
Christopher Faulet47596d32018-10-22 09:17:28 +0200143 v.len -= (p - v.ptr);
144 v.ptr = p;
145 if (!v.len)
146 goto next_blk;
147 /* Skip comma */
148 if (*(v.ptr) == ',') {
Tim Duesterhus284fbe12021-11-04 22:35:44 +0100149 v = istnext(v);
Christopher Faulet47596d32018-10-22 09:17:28 +0200150 }
151
152 goto return_hdr;
153 }
154
Christopher Faulet192c6a22019-06-11 16:32:24 +0200155 if (htx_is_empty(htx))
Christopher Faulet47596d32018-10-22 09:17:28 +0200156 return 0;
157
Christopher Fauleta3f15502019-05-13 15:27:23 +0200158 for (blk = htx_get_first_blk(htx); blk; blk = htx_get_next_blk(htx, blk)) {
Christopher Faulet47596d32018-10-22 09:17:28 +0200159 rescan_hdr:
Christopher Faulet47596d32018-10-22 09:17:28 +0200160 type = htx_get_blk_type(blk);
Christopher Fauletd1ac2b92020-12-02 19:12:22 +0100161 if (type == HTX_BLK_EOH)
Christopher Faulet573fe732018-11-28 16:55:12 +0100162 break;
Christopher Faulet47596d32018-10-22 09:17:28 +0200163 if (type != HTX_BLK_HDR)
Christopher Faulet28f29c72019-04-30 17:55:45 +0200164 continue;
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200165
166 if ((flags & HTTP_FIND_FL_MATCH_TYPE) == HTTP_FIND_FL_MATCH_REG) {
167 const struct my_regex *re = pattern;
168
169 n = htx_get_blk_name(htx, blk);
170 if (!regex_exec2(re, n.ptr, n.len))
171 goto next_blk;
172 }
173 else {
174 const struct ist name = *(const struct ist *)(pattern);
175
Christopher Faulet47596d32018-10-22 09:17:28 +0200176 /* If no name was passed, we want any header. So skip the comparison */
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200177 if (!istlen(name))
178 goto match;
179
Christopher Faulet47596d32018-10-22 09:17:28 +0200180 n = htx_get_blk_name(htx, blk);
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200181 switch (flags & HTTP_FIND_FL_MATCH_TYPE) {
182 case HTTP_FIND_FL_MATCH_STR:
183 if (!isteqi(n, name))
184 goto next_blk;
185 break;
186 case HTTP_FIND_FL_MATCH_PFX:
187 if (istlen(n) < istlen(name))
188 goto next_blk;
189
190 n = ist2(istptr(n), istlen(name));
191 if (!isteqi(n, name))
192 goto next_blk;
193 break;
194 case HTTP_FIND_FL_MATCH_SFX:
195 if (istlen(n) < istlen(name))
196 goto next_blk;
197
Tim Duesterhus4c8f75f2021-11-06 15:14:44 +0100198 n = ist2(istend(n) - istlen(name),
199 istlen(name));
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200200 if (!isteqi(n, name))
201 goto next_blk;
202 break;
203 case HTTP_FIND_FL_MATCH_SUB:
Maciej Zdeb302b9f82020-11-20 12:12:24 +0000204 if (!strnistr(n.ptr, n.len, name.ptr, name.len))
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200205 goto next_blk;
206 break;
207 default:
Christopher Faulet47596d32018-10-22 09:17:28 +0200208 goto next_blk;
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200209 break;
210 }
Christopher Faulet47596d32018-10-22 09:17:28 +0200211 }
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200212 match:
Christopher Faulet47596d32018-10-22 09:17:28 +0200213 v = htx_get_blk_value(htx, blk);
214
215 return_hdr:
216 ctx->lws_before = 0;
217 ctx->lws_after = 0;
218 while (v.len && HTTP_IS_LWS(*v.ptr)) {
Tim Duesterhus284fbe12021-11-04 22:35:44 +0100219 v = istnext(v);
Christopher Faulet47596d32018-10-22 09:17:28 +0200220 ctx->lws_before++;
221 }
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200222 if (!(flags & HTTP_FIND_FL_FULL))
Tim Duesterhus4c8f75f2021-11-06 15:14:44 +0100223 v.len = http_find_hdr_value_end(v.ptr, istend(v)) - v.ptr;
224
225 while (v.len && HTTP_IS_LWS(*(istend(v) - 1))) {
Christopher Faulet47596d32018-10-22 09:17:28 +0200226 v.len--;
227 ctx->lws_after++;
228 }
Christopher Faulet47596d32018-10-22 09:17:28 +0200229 ctx->blk = blk;
230 ctx->value = v;
231 return 1;
232
233 next_blk:
Christopher Faulet28f29c72019-04-30 17:55:45 +0200234 ;
Christopher Faulet47596d32018-10-22 09:17:28 +0200235 }
236
237 ctx->blk = NULL;
238 ctx->value = ist("");
239 ctx->lws_before = ctx->lws_after = 0;
240 return 0;
241}
242
Christopher Faulet8dd33e12020-05-05 07:42:42 +0200243
244/* Header names must match <name> */
245int http_find_header(const struct htx *htx, const struct ist name, struct http_hdr_ctx *ctx, int full)
246{
247 return __http_find_header(htx, &name, ctx, HTTP_FIND_FL_MATCH_STR | (full ? HTTP_FIND_FL_FULL : 0));
248}
249
250/* Header names must match <name>. Same than http_find_header */
251int http_find_str_header(const struct htx *htx, const struct ist name, struct http_hdr_ctx *ctx, int full)
252{
253 return __http_find_header(htx, &name, ctx, HTTP_FIND_FL_MATCH_STR | (full ? HTTP_FIND_FL_FULL : 0));
254}
255
256
257/* Header names must start with <prefix> */
258int http_find_pfx_header(const struct htx *htx, const struct ist prefix, struct http_hdr_ctx *ctx, int full)
259{
260 return __http_find_header(htx, &prefix, ctx, HTTP_FIND_FL_MATCH_PFX | (full ? HTTP_FIND_FL_FULL : 0));
261}
262
263/* Header names must end with <suffix> */
264int http_find_sfx_header(const struct htx *htx, const struct ist suffix, struct http_hdr_ctx *ctx, int full)
265{
266 return __http_find_header(htx, &suffix, ctx, HTTP_FIND_FL_MATCH_SFX | (full ? HTTP_FIND_FL_FULL : 0));
267}
268/* Header names must contain <sub> */
269int http_find_sub_header(const struct htx *htx, const struct ist sub, struct http_hdr_ctx *ctx, int full)
270{
271 return __http_find_header(htx, &sub, ctx, HTTP_FIND_FL_MATCH_SUB | (full ? HTTP_FIND_FL_FULL : 0));
272}
273
274/* Header names must match <re> regex*/
275int http_match_header(const struct htx *htx, const struct my_regex *re, struct http_hdr_ctx *ctx, int full)
276{
277 return __http_find_header(htx, re, ctx, HTTP_FIND_FL_MATCH_REG | (full ? HTTP_FIND_FL_FULL : 0));
278}
279
280
Christopher Faulet47596d32018-10-22 09:17:28 +0200281/* Adds a header block int the HTX message <htx>, just before the EOH block. It
282 * returns 1 on success, otherwise it returns 0.
283 */
284int http_add_header(struct htx *htx, const struct ist n, const struct ist v)
285{
286 struct htx_blk *blk;
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200287 struct htx_sl *sl;
Christopher Faulet47596d32018-10-22 09:17:28 +0200288 enum htx_blk_type type = htx_get_tail_type(htx);
289 int32_t prev;
290
291 blk = htx_add_header(htx, n, v);
292 if (!blk)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200293 goto fail;
Christopher Faulet47596d32018-10-22 09:17:28 +0200294
295 if (unlikely(type < HTX_BLK_EOH))
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200296 goto end;
Christopher Faulet47596d32018-10-22 09:17:28 +0200297
298 /* <blk> is the head, swap it iteratively with its predecessor to place
299 * it just before the end-of-header block. So blocks remains ordered. */
Christopher Faulet29f17582019-05-23 11:03:26 +0200300 for (prev = htx_get_prev(htx, htx->tail); prev != htx->first; prev = htx_get_prev(htx, prev)) {
Christopher Faulet47596d32018-10-22 09:17:28 +0200301 struct htx_blk *pblk = htx_get_blk(htx, prev);
302 enum htx_blk_type type = htx_get_blk_type(pblk);
303
304 /* Swap .addr and .info fields */
305 blk->addr ^= pblk->addr; pblk->addr ^= blk->addr; blk->addr ^= pblk->addr;
306 blk->info ^= pblk->info; pblk->info ^= blk->info; blk->info ^= pblk->info;
307
308 if (blk->addr == pblk->addr)
309 blk->addr += htx_get_blksz(pblk);
Christopher Faulet47596d32018-10-22 09:17:28 +0200310
311 /* Stop when end-of-header is reached */
312 if (type == HTX_BLK_EOH)
313 break;
314
315 blk = pblk;
316 }
Christopher Faulet05aab642019-04-11 13:43:57 +0200317
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200318 end:
319 sl = http_get_stline(htx);
Christopher Faulet3e1f7f42020-02-28 09:47:07 +0100320 if (sl && (sl->flags & HTX_SL_F_HAS_AUTHORITY) && isteqi(n, ist("host"))) {
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200321 if (!http_update_authority(htx, sl, v))
322 goto fail;
323 }
Christopher Faulet47596d32018-10-22 09:17:28 +0200324 return 1;
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200325
326 fail:
327 return 0;
Christopher Faulet47596d32018-10-22 09:17:28 +0200328}
329
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100330/* Replaces parts of the start-line of the HTX message <htx>. It returns 1 on
Christopher Faulet29f17582019-05-23 11:03:26 +0200331 * success, otherwise it returns 0.
Christopher Faulet47596d32018-10-22 09:17:28 +0200332 */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100333int http_replace_stline(struct htx *htx, const struct ist p1, const struct ist p2, const struct ist p3)
Christopher Faulet47596d32018-10-22 09:17:28 +0200334{
Christopher Faulet7b7d5072019-05-13 15:22:59 +0200335 struct htx_blk *blk;
Christopher Faulet47596d32018-10-22 09:17:28 +0200336
Christopher Faulet29f17582019-05-23 11:03:26 +0200337 blk = htx_get_first_blk(htx);
338 if (!blk || !htx_replace_stline(htx, blk, p1, p2, p3))
Christopher Faulet7b7d5072019-05-13 15:22:59 +0200339 return 0;
340 return 1;
Christopher Faulet47596d32018-10-22 09:17:28 +0200341}
342
Christopher Faulete010c802018-10-24 10:36:45 +0200343/* Replace the request method in the HTX message <htx> by <meth>. It returns 1
344 * on success, otherwise 0.
345 */
346int http_replace_req_meth(struct htx *htx, const struct ist meth)
347{
348 struct buffer *temp = get_trash_chunk();
Christopher Faulet297fbb42019-05-13 14:41:27 +0200349 struct htx_sl *sl = http_get_stline(htx);
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100350 struct ist uri, vsn;
Christopher Faulete010c802018-10-24 10:36:45 +0200351
Willy Tarreaucdce54c2019-02-12 12:02:27 +0100352 if (!sl)
353 return 0;
354
Christopher Faulete010c802018-10-24 10:36:45 +0200355 /* Start by copying old uri and version */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100356 chunk_memcat(temp, HTX_SL_REQ_UPTR(sl), HTX_SL_REQ_ULEN(sl)); /* uri */
357 uri = ist2(temp->area, HTX_SL_REQ_ULEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200358
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100359 chunk_memcat(temp, HTX_SL_REQ_VPTR(sl), HTX_SL_REQ_VLEN(sl)); /* vsn */
360 vsn = ist2(temp->area + uri.len, HTX_SL_REQ_VLEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200361
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100362 /* create the new start line */
363 sl->info.req.meth = find_http_meth(meth.ptr, meth.len);
364 return http_replace_stline(htx, meth, uri, vsn);
Christopher Faulete010c802018-10-24 10:36:45 +0200365}
366
367/* Replace the request uri in the HTX message <htx> by <uri>. It returns 1 on
368 * success, otherwise 0.
369 */
370int http_replace_req_uri(struct htx *htx, const struct ist uri)
371{
372 struct buffer *temp = get_trash_chunk();
Christopher Faulet297fbb42019-05-13 14:41:27 +0200373 struct htx_sl *sl = http_get_stline(htx);
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100374 struct ist meth, vsn;
Christopher Faulete010c802018-10-24 10:36:45 +0200375
Willy Tarreaucdce54c2019-02-12 12:02:27 +0100376 if (!sl)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200377 goto fail;
Willy Tarreaucdce54c2019-02-12 12:02:27 +0100378
Christopher Faulete010c802018-10-24 10:36:45 +0200379 /* Start by copying old method and version */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100380 chunk_memcat(temp, HTX_SL_REQ_MPTR(sl), HTX_SL_REQ_MLEN(sl)); /* meth */
381 meth = ist2(temp->area, HTX_SL_REQ_MLEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200382
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100383 chunk_memcat(temp, HTX_SL_REQ_VPTR(sl), HTX_SL_REQ_VLEN(sl)); /* vsn */
384 vsn = ist2(temp->area + meth.len, HTX_SL_REQ_VLEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200385
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100386 /* create the new start line */
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200387 if (!http_replace_stline(htx, meth, uri, vsn))
388 goto fail;
389
390 sl = http_get_stline(htx);
391 if (!http_update_host(htx, sl, uri))
392 goto fail;
393
394 return 1;
395 fail:
396 return 0;
Christopher Faulete010c802018-10-24 10:36:45 +0200397}
398
Christopher Fauletb8ce5052020-08-31 16:11:57 +0200399/* Replace the request path in the HTX message <htx> by <path>. The host part is
400 * preserverd. if <with_qs> is set, the query string is evaluated as part of the
401 * path and replaced. Otherwise, it is preserved too. It returns 1 on success,
402 * otherwise 0.
Christopher Faulete010c802018-10-24 10:36:45 +0200403 */
Christopher Fauletb8ce5052020-08-31 16:11:57 +0200404int http_replace_req_path(struct htx *htx, const struct ist path, int with_qs)
Christopher Faulete010c802018-10-24 10:36:45 +0200405{
406 struct buffer *temp = get_trash_chunk();
Christopher Faulet297fbb42019-05-13 14:41:27 +0200407 struct htx_sl *sl = http_get_stline(htx);
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100408 struct ist meth, uri, vsn, p;
Christopher Faulete010c802018-10-24 10:36:45 +0200409 size_t plen = 0;
Amaury Denoyellec453f952021-07-06 11:40:12 +0200410 struct http_uri_parser parser;
Christopher Faulete010c802018-10-24 10:36:45 +0200411
Willy Tarreaucdce54c2019-02-12 12:02:27 +0100412 if (!sl)
413 return 0;
414
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100415 uri = htx_sl_req_uri(sl);
Amaury Denoyellec453f952021-07-06 11:40:12 +0200416 parser = http_uri_parser_init(uri);
417 p = http_parse_path(&parser);
Tim Duesterhused526372020-03-05 17:56:33 +0100418 if (!isttest(p))
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100419 p = uri;
Christopher Fauletb8ce5052020-08-31 16:11:57 +0200420 if (with_qs)
421 plen = p.len;
422 else {
423 while (plen < p.len && *(p.ptr + plen) != '?')
424 plen++;
425 }
Christopher Faulete010c802018-10-24 10:36:45 +0200426
427 /* Start by copying old method and version and create the new uri */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100428 chunk_memcat(temp, HTX_SL_REQ_MPTR(sl), HTX_SL_REQ_MLEN(sl)); /* meth */
429 meth = ist2(temp->area, HTX_SL_REQ_MLEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200430
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100431 chunk_memcat(temp, HTX_SL_REQ_VPTR(sl), HTX_SL_REQ_VLEN(sl)); /* vsn */
432 vsn = ist2(temp->area + meth.len, HTX_SL_REQ_VLEN(sl));
433
434 chunk_memcat(temp, uri.ptr, p.ptr - uri.ptr); /* uri: host part */
Tim Duesterhus9f7ed8a2021-11-08 09:05:04 +0100435 chunk_istcat(temp, path); /* uri: new path */
Christopher Faulete010c802018-10-24 10:36:45 +0200436 chunk_memcat(temp, p.ptr + plen, p.len - plen); /* uri: QS part */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100437 uri = ist2(temp->area + meth.len + vsn.len, uri.len - plen + path.len);
Christopher Faulete010c802018-10-24 10:36:45 +0200438
439 /* create the new start line */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100440 return http_replace_stline(htx, meth, uri, vsn);
Christopher Faulete010c802018-10-24 10:36:45 +0200441}
442
443/* Replace the request query-string in the HTX message <htx> by <query>. The
444 * host part and the path are preserved. It returns 1 on success, otherwise
445 * 0.
446 */
447int http_replace_req_query(struct htx *htx, const struct ist query)
448{
449 struct buffer *temp = get_trash_chunk();
Christopher Faulet297fbb42019-05-13 14:41:27 +0200450 struct htx_sl *sl = http_get_stline(htx);
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100451 struct ist meth, uri, vsn, q;
Christopher Faulete010c802018-10-24 10:36:45 +0200452 int offset = 1;
453
Willy Tarreaucdce54c2019-02-12 12:02:27 +0100454 if (!sl)
455 return 0;
456
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100457 uri = htx_sl_req_uri(sl);
458 q = uri;
Christopher Faulete010c802018-10-24 10:36:45 +0200459 while (q.len > 0 && *(q.ptr) != '?') {
Tim Duesterhus284fbe12021-11-04 22:35:44 +0100460 q = istnext(q);
Christopher Faulete010c802018-10-24 10:36:45 +0200461 }
462
463 /* skip the question mark or indicate that we must insert it
464 * (but only if the format string is not empty then).
465 */
466 if (q.len) {
Tim Duesterhus284fbe12021-11-04 22:35:44 +0100467 q = istnext(q);
Christopher Faulete010c802018-10-24 10:36:45 +0200468 }
469 else if (query.len > 1)
470 offset = 0;
471
472 /* Start by copying old method and version and create the new uri */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100473 chunk_memcat(temp, HTX_SL_REQ_MPTR(sl), HTX_SL_REQ_MLEN(sl)); /* meth */
474 meth = ist2(temp->area, HTX_SL_REQ_MLEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200475
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100476 chunk_memcat(temp, HTX_SL_REQ_VPTR(sl), HTX_SL_REQ_VLEN(sl)); /* vsn */
477 vsn = ist2(temp->area + meth.len, HTX_SL_REQ_VLEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200478
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100479 chunk_memcat(temp, uri.ptr, q.ptr - uri.ptr); /* uri: host + path part */
480 chunk_memcat(temp, query.ptr + offset, query.len - offset); /* uri: new QS */
481 uri = ist2(temp->area + meth.len + vsn.len, uri.len - q.len + query.len - offset);
Christopher Faulete010c802018-10-24 10:36:45 +0200482
483 /* create the new start line */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100484 return http_replace_stline(htx, meth, uri, vsn);
Christopher Faulete010c802018-10-24 10:36:45 +0200485}
486
487/* Replace the response status in the HTX message <htx> by <status>. It returns
488 * 1 on success, otherwise 0.
489*/
Christopher Fauletbde2c4c2020-08-31 16:43:34 +0200490int http_replace_res_status(struct htx *htx, const struct ist status, const struct ist reason)
Christopher Faulete010c802018-10-24 10:36:45 +0200491{
492 struct buffer *temp = get_trash_chunk();
Christopher Faulet297fbb42019-05-13 14:41:27 +0200493 struct htx_sl *sl = http_get_stline(htx);
Christopher Fauletbde2c4c2020-08-31 16:43:34 +0200494 struct ist vsn, r;
Christopher Faulete010c802018-10-24 10:36:45 +0200495
Willy Tarreaucdce54c2019-02-12 12:02:27 +0100496 if (!sl)
497 return 0;
498
Christopher Faulete010c802018-10-24 10:36:45 +0200499 /* Start by copying old uri and version */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100500 chunk_memcat(temp, HTX_SL_RES_VPTR(sl), HTX_SL_RES_VLEN(sl)); /* vsn */
501 vsn = ist2(temp->area, HTX_SL_RES_VLEN(sl));
Christopher Fauletbde2c4c2020-08-31 16:43:34 +0200502 r = reason;
503 if (!isttest(r)) {
504 chunk_memcat(temp, HTX_SL_RES_RPTR(sl), HTX_SL_RES_RLEN(sl)); /* reason */
505 r = ist2(temp->area + vsn.len, HTX_SL_RES_RLEN(sl));
506 }
Christopher Faulete010c802018-10-24 10:36:45 +0200507
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100508 /* create the new start line */
509 sl->info.res.status = strl2ui(status.ptr, status.len);
Christopher Fauletbde2c4c2020-08-31 16:43:34 +0200510 return http_replace_stline(htx, vsn, status, r);
Christopher Faulete010c802018-10-24 10:36:45 +0200511}
512
513/* Replace the response reason in the HTX message <htx> by <reason>. It returns
514 * 1 on success, otherwise 0.
515*/
516int http_replace_res_reason(struct htx *htx, const struct ist reason)
517{
518 struct buffer *temp = get_trash_chunk();
Christopher Faulet297fbb42019-05-13 14:41:27 +0200519 struct htx_sl *sl = http_get_stline(htx);
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100520 struct ist vsn, status;
Christopher Faulete010c802018-10-24 10:36:45 +0200521
Willy Tarreaucdce54c2019-02-12 12:02:27 +0100522 if (!sl)
523 return 0;
524
Christopher Faulete010c802018-10-24 10:36:45 +0200525 /* Start by copying old uri and version */
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100526 chunk_memcat(temp, HTX_SL_RES_VPTR(sl), HTX_SL_RES_VLEN(sl)); /* vsn */
527 vsn = ist2(temp->area, HTX_SL_RES_VLEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200528
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100529 chunk_memcat(temp, HTX_SL_RES_CPTR(sl), HTX_SL_RES_CLEN(sl)); /* code */
530 status = ist2(temp->area + vsn.len, HTX_SL_RES_CLEN(sl));
Christopher Faulete010c802018-10-24 10:36:45 +0200531
Christopher Fauletf1ba18d2018-11-26 21:37:08 +0100532 /* create the new start line */
533 return http_replace_stline(htx, vsn, status, reason);
Christopher Faulete010c802018-10-24 10:36:45 +0200534}
535
Christopher Faulet47596d32018-10-22 09:17:28 +0200536/* Replaces a part of a header value referenced in the context <ctx> by
537 * <data>. It returns 1 on success, otherwise it returns 0. The context is
538 * updated if necessary.
539 */
540int http_replace_header_value(struct htx *htx, struct http_hdr_ctx *ctx, const struct ist data)
541{
542 struct htx_blk *blk = ctx->blk;
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200543 struct htx_sl *sl;
Christopher Faulet47596d32018-10-22 09:17:28 +0200544 char *start;
545 struct ist v;
546 uint32_t len, off;
547
548 if (!blk)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200549 goto fail;
Christopher Faulet47596d32018-10-22 09:17:28 +0200550
551 v = htx_get_blk_value(htx, blk);
552 start = ctx->value.ptr - ctx->lws_before;
553 len = ctx->lws_before + ctx->value.len + ctx->lws_after;
554 off = start - v.ptr;
555
556 blk = htx_replace_blk_value(htx, blk, ist2(start, len), data);
557 if (!blk)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200558 goto fail;
Christopher Faulet47596d32018-10-22 09:17:28 +0200559
560 v = htx_get_blk_value(htx, blk);
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200561
562 sl = http_get_stline(htx);
563 if (sl && (sl->flags & HTX_SL_F_HAS_AUTHORITY)) {
564 struct ist n = htx_get_blk_name(htx, blk);
565
566 if (isteq(n, ist("host"))) {
567 if (!http_update_authority(htx, sl, v))
568 goto fail;
569 ctx->blk = NULL;
570 http_find_header(htx, ist("host"), ctx, 1);
571 blk = ctx->blk;
572 v = htx_get_blk_value(htx, blk);
573 }
574 }
575
Christopher Faulet47596d32018-10-22 09:17:28 +0200576 ctx->blk = blk;
Tim Duesterhus77508502022-03-15 13:11:06 +0100577 ctx->value = ist2(v.ptr + off, data.len);
Christopher Faulet47596d32018-10-22 09:17:28 +0200578 ctx->lws_before = ctx->lws_after = 0;
579
580 return 1;
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200581 fail:
582 return 0;
Christopher Faulet47596d32018-10-22 09:17:28 +0200583}
584
585/* Fully replaces a header referenced in the context <ctx> by the name <name>
586 * with the value <value>. It returns 1 on success, otherwise it returns 0. The
587 * context is updated if necessary.
588 */
589int http_replace_header(struct htx *htx, struct http_hdr_ctx *ctx,
590 const struct ist name, const struct ist value)
591{
592 struct htx_blk *blk = ctx->blk;
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200593 struct htx_sl *sl;
Christopher Faulet47596d32018-10-22 09:17:28 +0200594
595 if (!blk)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200596 goto fail;
Christopher Faulet47596d32018-10-22 09:17:28 +0200597
598 blk = htx_replace_header(htx, blk, name, value);
599 if (!blk)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200600 goto fail;
601
602 sl = http_get_stline(htx);
Christopher Faulet3e1f7f42020-02-28 09:47:07 +0100603 if (sl && (sl->flags & HTX_SL_F_HAS_AUTHORITY) && isteqi(name, ist("host"))) {
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200604 if (!http_update_authority(htx, sl, value))
605 goto fail;
606 ctx->blk = NULL;
607 http_find_header(htx, ist("host"), ctx, 1);
608 blk = ctx->blk;
609 }
Christopher Faulet47596d32018-10-22 09:17:28 +0200610
611 ctx->blk = blk;
612 ctx->value = ist(NULL);
613 ctx->lws_before = ctx->lws_after = 0;
614
615 return 1;
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200616 fail:
617 return 0;
Christopher Faulet47596d32018-10-22 09:17:28 +0200618}
619
620/* Remove one value of a header. This only works on a <ctx> returned by
621 * http_find_header function. The value is removed, as well as surrounding commas
622 * if any. If the removed value was alone, the whole header is removed. The
623 * <ctx> is always updated accordingly, as well as the HTX message <htx>. It
624 * returns 1 on success. Otherwise, it returns 0. The <ctx> is always left in a
625 * form that can be handled by http_find_header() to find next occurrence.
626 */
627int http_remove_header(struct htx *htx, struct http_hdr_ctx *ctx)
628{
629 struct htx_blk *blk = ctx->blk;
630 char *start;
631 struct ist v;
632 uint32_t len;
633
634 if (!blk)
635 return 0;
636
637 start = ctx->value.ptr - ctx->lws_before;
638 len = ctx->lws_before + ctx->value.len + ctx->lws_after;
639
640 v = htx_get_blk_value(htx, blk);
641 if (len == v.len) {
642 blk = htx_remove_blk(htx, blk);
Christopher Faulet192c6a22019-06-11 16:32:24 +0200643 if (blk || htx_is_empty(htx)) {
Christopher Faulet47596d32018-10-22 09:17:28 +0200644 ctx->blk = blk;
Tim Duesterhus241e29e2020-03-05 17:56:30 +0100645 ctx->value = IST_NULL;
Christopher Faulet47596d32018-10-22 09:17:28 +0200646 ctx->lws_before = ctx->lws_after = 0;
647 }
648 else {
649 ctx->blk = htx_get_blk(htx, htx->tail);
650 ctx->value = htx_get_blk_value(htx, ctx->blk);
651 ctx->lws_before = ctx->lws_after = 0;
652 }
653 return 1;
654 }
655
656 /* This was not the only value of this header. We have to remove the
657 * part pointed by ctx->value. If it is the last entry of the list, we
658 * remove the last separator.
659 */
660 if (start == v.ptr) {
661 /* It's the first header part but not the only one. So remove
662 * the comma after it. */
663 len++;
664 }
665 else {
666 /* There is at least one header part before the removed one. So
667 * remove the comma between them. */
668 start--;
669 len++;
670 }
671 /* Update the block content and its len */
672 memmove(start, start+len, v.len-len);
Christopher Faulet3e2638e2019-06-18 09:49:16 +0200673 htx_change_blk_value_len(htx, blk, v.len-len);
Christopher Faulet47596d32018-10-22 09:17:28 +0200674
675 /* Finally update the ctx */
Tim Duesterhus77508502022-03-15 13:11:06 +0100676 ctx->value = ist2(start, 0);
Christopher Faulet47596d32018-10-22 09:17:28 +0200677 ctx->lws_before = ctx->lws_after = 0;
678
679 return 1;
680}
Christopher Faulet7ff1cea2018-10-24 10:39:35 +0200681
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200682/* Updates the authority part of the uri with the value <host>. It happens when
683 * the header host is modified. It returns 0 on failure and 1 on success. It is
684 * the caller responsibility to provide the start-line and to be sure the uri
685 * contains an authority. Thus, if no authority is found in the uri, an error is
686 * returned.
687 */
Christopher Faulet1543d442020-04-28 19:57:29 +0200688int http_update_authority(struct htx *htx, struct htx_sl *sl, const struct ist host)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200689{
690 struct buffer *temp = get_trash_chunk();
691 struct ist meth, vsn, uri, authority;
Amaury Denoyelle69294b22021-07-06 11:02:22 +0200692 struct http_uri_parser parser;
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200693
694 uri = htx_sl_req_uri(sl);
Amaury Denoyelle69294b22021-07-06 11:02:22 +0200695 parser = http_uri_parser_init(uri);
696 authority = http_parse_authority(&parser, 1);
Christopher Faulet34b18e42020-02-18 11:02:21 +0100697 if (!authority.len)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200698 return 0;
699
Christopher Faulet34b18e42020-02-18 11:02:21 +0100700 /* Don't update the uri if there is no change */
701 if (isteq(host, authority))
702 return 1;
703
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200704 /* Start by copying old method and version */
705 chunk_memcat(temp, HTX_SL_REQ_MPTR(sl), HTX_SL_REQ_MLEN(sl)); /* meth */
706 meth = ist2(temp->area, HTX_SL_REQ_MLEN(sl));
707
708 chunk_memcat(temp, HTX_SL_REQ_VPTR(sl), HTX_SL_REQ_VLEN(sl)); /* vsn */
709 vsn = ist2(temp->area + meth.len, HTX_SL_REQ_VLEN(sl));
710
711 chunk_memcat(temp, uri.ptr, authority.ptr - uri.ptr);
Tim Duesterhus9f7ed8a2021-11-08 09:05:04 +0100712 chunk_istcat(temp, host);
Tim Duesterhus4c8f75f2021-11-06 15:14:44 +0100713 chunk_memcat(temp, istend(authority), istend(uri) - istend(authority));
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200714 uri = ist2(temp->area + meth.len + vsn.len, host.len + uri.len - authority.len); /* uri */
715
716 return http_replace_stline(htx, meth, uri, vsn);
717
718}
719
720/* Update the header host by extracting the authority of the uri <uri>. flags of
721 * the start-line are also updated accordingly. For orgin-form and asterisk-form
722 * uri, the header host is not changed and the flag HTX_SL_F_HAS_AUTHORITY is
723 * removed from the flags of the start-line. Otherwise, this flag is set and the
724 * authority is used to set the value of the header host. This function returns
725 * 0 on failure and 1 on success.
726*/
Christopher Faulet1543d442020-04-28 19:57:29 +0200727int http_update_host(struct htx *htx, struct htx_sl *sl, const struct ist uri)
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200728{
729 struct ist authority;
730 struct http_hdr_ctx ctx;
Amaury Denoyelle69294b22021-07-06 11:02:22 +0200731 struct http_uri_parser parser = http_uri_parser_init(uri);
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200732
Amaury Denoyelle69294b22021-07-06 11:02:22 +0200733 if (parser.format == URI_PARSER_FORMAT_EMPTY ||
734 parser.format == URI_PARSER_FORMAT_ASTERISK ||
735 parser.format == URI_PARSER_FORMAT_ABSPATH) {
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200736 sl->flags &= ~HTX_SL_F_HAS_AUTHORITY;
737 }
738 else {
739 sl->flags |= HTX_SL_F_HAS_AUTHORITY;
740 if (sl->info.req.meth != HTTP_METH_CONNECT) {
741 // absolute-form (RFC7320 #5.3.2)
742 sl->flags |= HTX_SL_F_HAS_SCHM;
743 if (uri.len > 4 && (uri.ptr[0] | 0x20) == 'h')
744 sl->flags |= ((uri.ptr[4] == ':') ? HTX_SL_F_SCHM_HTTP : HTX_SL_F_SCHM_HTTPS);
745
Amaury Denoyelle69294b22021-07-06 11:02:22 +0200746 authority = http_parse_authority(&parser, 1);
Christopher Fauletd7b7a1c2019-10-08 15:24:52 +0200747 if (!authority.len)
748 goto fail;
749 }
750 else {
751 // authority-form (RFC7320 #5.3.3)
752 authority = uri;
753 }
754
755 /* Replace header host value */
756 ctx.blk = NULL;
757 while (http_find_header(htx, ist("host"), &ctx, 1)) {
758 if (!http_replace_header_value(htx, &ctx, authority))
759 goto fail;
760 }
761
762 }
763 return 1;
764 fail:
765 return 0;
766}
Christopher Faulet7ff1cea2018-10-24 10:39:35 +0200767
768/* Return in <vptr> and <vlen> the pointer and length of occurrence <occ> of
769 * header whose name is <hname> of length <hlen>. If <ctx> is null, lookup is
770 * performed over the whole headers. Otherwise it must contain a valid header
771 * context, initialised with ctx->blk=NULL for the first lookup in a series. If
772 * <occ> is positive or null, occurrence #occ from the beginning (or last ctx)
773 * is returned. Occ #0 and #1 are equivalent. If <occ> is negative (and no less
774 * than -MAX_HDR_HISTORY), the occurrence is counted from the last one which is
775 * -1. The value fetch stops at commas, so this function is suited for use with
776 * list headers.
777 * The return value is 0 if nothing was found, or non-zero otherwise.
778 */
779unsigned int http_get_htx_hdr(const struct htx *htx, const struct ist hdr,
780 int occ, struct http_hdr_ctx *ctx, char **vptr, size_t *vlen)
781{
782 struct http_hdr_ctx local_ctx;
783 struct ist val_hist[MAX_HDR_HISTORY];
784 unsigned int hist_idx;
785 int found;
786
787 if (!ctx) {
788 local_ctx.blk = NULL;
789 ctx = &local_ctx;
790 }
791
792 if (occ >= 0) {
793 /* search from the beginning */
794 while (http_find_header(htx, hdr, ctx, 0)) {
795 occ--;
796 if (occ <= 0) {
797 *vptr = ctx->value.ptr;
798 *vlen = ctx->value.len;
799 return 1;
800 }
801 }
802 return 0;
803 }
804
805 /* negative occurrence, we scan all the list then walk back */
806 if (-occ > MAX_HDR_HISTORY)
807 return 0;
808
809 found = hist_idx = 0;
810 while (http_find_header(htx, hdr, ctx, 0)) {
811 val_hist[hist_idx] = ctx->value;
812 if (++hist_idx >= MAX_HDR_HISTORY)
813 hist_idx = 0;
814 found++;
815 }
816 if (-occ > found)
817 return 0;
818
819 /* OK now we have the last occurrence in [hist_idx-1], and we need to
820 * find occurrence -occ. 0 <= hist_idx < MAX_HDR_HISTORY, and we have
821 * -10 <= occ <= -1. So we have to check [hist_idx%MAX_HDR_HISTORY+occ]
822 * to remain in the 0..9 range.
823 */
824 hist_idx += occ + MAX_HDR_HISTORY;
825 if (hist_idx >= MAX_HDR_HISTORY)
826 hist_idx -= MAX_HDR_HISTORY;
827 *vptr = val_hist[hist_idx].ptr;
828 *vlen = val_hist[hist_idx].len;
829 return 1;
830}
831
832/* Return in <vptr> and <vlen> the pointer and length of occurrence <occ> of
833 * header whose name is <hname> of length <hlen>. If <ctx> is null, lookup is
834 * performed over the whole headers. Otherwise it must contain a valid header
835 * context, initialised with ctx->blk=NULL for the first lookup in a series. If
836 * <occ> is positive or null, occurrence #occ from the beginning (or last ctx)
837 * is returned. Occ #0 and #1 are equivalent. If <occ> is negative (and no less
838 * than -MAX_HDR_HISTORY), the occurrence is counted from the last one which is
839 * -1. This function differs from http_get_hdr() in that it only returns full
840 * line header values and does not stop at commas.
841 * The return value is 0 if nothing was found, or non-zero otherwise.
842 */
843unsigned int http_get_htx_fhdr(const struct htx *htx, const struct ist hdr,
844 int occ, struct http_hdr_ctx *ctx, char **vptr, size_t *vlen)
845{
846 struct http_hdr_ctx local_ctx;
847 struct ist val_hist[MAX_HDR_HISTORY];
848 unsigned int hist_idx;
849 int found;
850
851 if (!ctx) {
852 local_ctx.blk = NULL;
853 ctx = &local_ctx;
854 }
855
856 if (occ >= 0) {
857 /* search from the beginning */
858 while (http_find_header(htx, hdr, ctx, 1)) {
859 occ--;
860 if (occ <= 0) {
861 *vptr = ctx->value.ptr;
862 *vlen = ctx->value.len;
863 return 1;
864 }
865 }
866 return 0;
867 }
868
869 /* negative occurrence, we scan all the list then walk back */
870 if (-occ > MAX_HDR_HISTORY)
871 return 0;
872
873 found = hist_idx = 0;
874 while (http_find_header(htx, hdr, ctx, 1)) {
875 val_hist[hist_idx] = ctx->value;
876 if (++hist_idx >= MAX_HDR_HISTORY)
877 hist_idx = 0;
878 found++;
879 }
880 if (-occ > found)
881 return 0;
882
883 /* OK now we have the last occurrence in [hist_idx-1], and we need to
884 * find occurrence -occ. 0 <= hist_idx < MAX_HDR_HISTORY, and we have
885 * -10 <= occ <= -1. So we have to check [hist_idx%MAX_HDR_HISTORY+occ]
886 * to remain in the 0..9 range.
887 */
888 hist_idx += occ + MAX_HDR_HISTORY;
889 if (hist_idx >= MAX_HDR_HISTORY)
890 hist_idx -= MAX_HDR_HISTORY;
891 *vptr = val_hist[hist_idx].ptr;
892 *vlen = val_hist[hist_idx].len;
893 return 1;
894}
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100895
Christopher Fauleta66adf42020-11-05 22:43:41 +0100896int http_str_to_htx(struct buffer *buf, struct ist raw, char **errmsg)
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100897{
898 struct htx *htx;
899 struct htx_sl *sl;
900 struct h1m h1m;
Christopher Faulete4ab11b2019-06-11 15:05:37 +0200901 struct http_hdr hdrs[global.tune.max_http_hdr];
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100902 union h1_sl h1sl;
903 unsigned int flags = HTX_SL_F_IS_RESP;
904 int ret = 0;
905
Christopher Faulet90cc4812019-07-22 16:49:30 +0200906 b_reset(buf);
907 if (!raw.len) {
908 buf->size = 0;
Christopher Faulet1cdc0282021-02-05 10:29:29 +0100909 buf->area = NULL;
Christopher Faulet90cc4812019-07-22 16:49:30 +0200910 return 1;
911 }
912
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100913 buf->size = global.tune.bufsize;
Tim Duesterhus403fd722021-04-08 20:05:23 +0200914 buf->area = malloc(buf->size);
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100915 if (!buf->area)
916 goto error;
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100917
918 h1m_init_res(&h1m);
919 h1m.flags |= H1_MF_NO_PHDR;
Tim Duesterhus4c8f75f2021-11-06 15:14:44 +0100920 ret = h1_headers_to_hdr_list(raw.ptr, istend(raw),
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100921 hdrs, sizeof(hdrs)/sizeof(hdrs[0]), &h1m, &h1sl);
Christopher Fauleta66adf42020-11-05 22:43:41 +0100922 if (ret <= 0) {
923 memprintf(errmsg, "unabled to parse headers (error offset: %d)", h1m.err_pos);
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100924 goto error;
Christopher Fauleta66adf42020-11-05 22:43:41 +0100925 }
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100926
Christopher Fauleta66adf42020-11-05 22:43:41 +0100927 if (unlikely(h1sl.st.v.len != 8)) {
928 memprintf(errmsg, "invalid http version (%.*s)", (int)h1sl.st.v.len, h1sl.st.v.ptr);
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100929 goto error;
Christopher Fauleta66adf42020-11-05 22:43:41 +0100930 }
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100931 if ((*(h1sl.st.v.ptr + 5) > '1') ||
932 ((*(h1sl.st.v.ptr + 5) == '1') && (*(h1sl.st.v.ptr + 7) >= '1')))
933 h1m.flags |= H1_MF_VER_11;
934
Christopher Fauleta66adf42020-11-05 22:43:41 +0100935 if (h1sl.st.status < 200 && (h1sl.st.status == 100 || h1sl.st.status >= 102)) {
936 memprintf(errmsg, "invalid http status code for an error message (%u)",
937 h1sl.st.status);
Christopher Faulet1d5ec092019-06-26 14:23:54 +0200938 goto error;
Christopher Fauleta66adf42020-11-05 22:43:41 +0100939 }
Christopher Faulet1d5ec092019-06-26 14:23:54 +0200940
Christopher Fauletb8d148a2020-10-09 08:50:26 +0200941 if (h1sl.st.status == 204 || h1sl.st.status == 304) {
942 /* Responses known to have no body. */
943 h1m.flags &= ~(H1_MF_CLEN|H1_MF_CHNK);
944 h1m.flags |= H1_MF_XFER_LEN;
945 h1m.curr_len = h1m.body_len = 0;
946 }
947 else if (h1m.flags & (H1_MF_CLEN|H1_MF_CHNK))
948 h1m.flags |= H1_MF_XFER_LEN;
949
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100950 if (h1m.flags & H1_MF_VER_11)
951 flags |= HTX_SL_F_VER_11;
952 if (h1m.flags & H1_MF_XFER_ENC)
953 flags |= HTX_SL_F_XFER_ENC;
Christopher Fauletb8d148a2020-10-09 08:50:26 +0200954 if (h1m.flags & H1_MF_XFER_LEN) {
955 flags |= HTX_SL_F_XFER_LEN;
Christopher Fauleta66adf42020-11-05 22:43:41 +0100956 if (h1m.flags & H1_MF_CHNK) {
957 memprintf(errmsg, "chunk-encoded payload not supported");
958 goto error;
959 }
Christopher Fauletb8d148a2020-10-09 08:50:26 +0200960 else if (h1m.flags & H1_MF_CLEN) {
961 flags |= HTX_SL_F_CLEN;
962 if (h1m.body_len == 0)
963 flags |= HTX_SL_F_BODYLESS;
964 }
965 else
Christopher Faulet0d4ce932019-10-16 09:09:04 +0200966 flags |= HTX_SL_F_BODYLESS;
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100967 }
Christopher Fauletb8d148a2020-10-09 08:50:26 +0200968
Christopher Fauleta66adf42020-11-05 22:43:41 +0100969 if ((flags & HTX_SL_F_BODYLESS) && raw.len > ret) {
970 memprintf(errmsg, "message payload not expected");
971 goto error;
972 }
973 if ((flags & HTX_SL_F_CLEN) && h1m.body_len != (raw.len - ret)) {
974 memprintf(errmsg, "payload size does not match the announced content-length (%lu != %lu)",
Willy Tarreau431a12c2020-11-06 14:24:02 +0100975 (unsigned long)(raw.len - ret), (unsigned long)h1m.body_len);
Christopher Fauleta66adf42020-11-05 22:43:41 +0100976 goto error;
977 }
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100978
979 htx = htx_from_buf(buf);
980 sl = htx_add_stline(htx, HTX_BLK_RES_SL, flags, h1sl.st.v, h1sl.st.c, h1sl.st.r);
Christopher Fauleta66adf42020-11-05 22:43:41 +0100981 if (!sl || !htx_add_all_headers(htx, hdrs)) {
982 memprintf(errmsg, "unable to add headers into the HTX message");
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100983 goto error;
Christopher Fauleta66adf42020-11-05 22:43:41 +0100984 }
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100985 sl->info.res.status = h1sl.st.status;
986
Willy Tarreau0a7ef022019-05-28 10:30:11 +0200987 while (raw.len > ret) {
988 int sent = htx_add_data(htx, ist2(raw.ptr + ret, raw.len - ret));
Christopher Fauleta66adf42020-11-05 22:43:41 +0100989 if (!sent) {
990 memprintf(errmsg, "unable to add payload into the HTX message");
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100991 goto error;
Christopher Fauleta66adf42020-11-05 22:43:41 +0100992 }
Willy Tarreau0a7ef022019-05-28 10:30:11 +0200993 ret += sent;
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100994 }
Christopher Faulet1d5ec092019-06-26 14:23:54 +0200995
Christopher Fauletd1ac2b92020-12-02 19:12:22 +0100996 htx->flags |= HTX_FL_EOM;
Christopher Faulet1d5ec092019-06-26 14:23:54 +0200997
Christopher Faulet90cc4812019-07-22 16:49:30 +0200998 return 1;
Christopher Fauleta7b677c2018-11-29 16:48:49 +0100999
1000error:
1001 if (buf->size)
1002 free(buf->area);
Christopher Faulet90cc4812019-07-22 16:49:30 +02001003 return 0;
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001004}
1005
Christopher Faulet18630642020-05-12 18:57:28 +02001006void release_http_reply(struct http_reply *http_reply)
1007{
1008 struct logformat_node *lf, *lfb;
1009 struct http_reply_hdr *hdr, *hdrb;
1010
1011 if (!http_reply)
1012 return;
1013
Willy Tarreau61cfdf42021-02-20 10:46:51 +01001014 ha_free(&http_reply->ctype);
Christopher Faulet18630642020-05-12 18:57:28 +02001015 list_for_each_entry_safe(hdr, hdrb, &http_reply->hdrs, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02001016 LIST_DELETE(&hdr->list);
Christopher Faulet18630642020-05-12 18:57:28 +02001017 list_for_each_entry_safe(lf, lfb, &hdr->value, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02001018 LIST_DELETE(&lf->list);
Christopher Faulet18630642020-05-12 18:57:28 +02001019 release_sample_expr(lf->expr);
1020 free(lf->arg);
1021 free(lf);
1022 }
1023 istfree(&hdr->name);
1024 free(hdr);
1025 }
1026
1027 if (http_reply->type == HTTP_REPLY_ERRFILES) {
Willy Tarreau61cfdf42021-02-20 10:46:51 +01001028 ha_free(&http_reply->body.http_errors);
Christopher Faulet18630642020-05-12 18:57:28 +02001029 }
1030 else if (http_reply->type == HTTP_REPLY_RAW)
1031 chunk_destroy(&http_reply->body.obj);
1032 else if (http_reply->type == HTTP_REPLY_LOGFMT) {
1033 list_for_each_entry_safe(lf, lfb, &http_reply->body.fmt, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02001034 LIST_DELETE(&lf->list);
Christopher Faulet18630642020-05-12 18:57:28 +02001035 release_sample_expr(lf->expr);
1036 free(lf->arg);
1037 free(lf);
1038 }
1039 }
Christopher Faulet63d48242020-05-21 09:59:22 +02001040 free(http_reply);
Christopher Faulet18630642020-05-12 18:57:28 +02001041}
1042
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001043static int http_htx_init(void)
1044{
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001045 struct buffer chk;
1046 struct ist raw;
Christopher Fauleta66adf42020-11-05 22:43:41 +01001047 char *errmsg = NULL;
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001048 int rc;
1049 int err_code = 0;
1050
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001051 for (rc = 0; rc < HTTP_ERR_SIZE; rc++) {
1052 if (!http_err_msgs[rc]) {
Christopher Fauleta66adf42020-11-05 22:43:41 +01001053 ha_alert("Internal error: no default message defined for HTTP return code %d", rc);
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001054 err_code |= ERR_ALERT | ERR_FATAL;
1055 continue;
1056 }
1057
Tim Duesterhus77508502022-03-15 13:11:06 +01001058 raw = ist(http_err_msgs[rc]);
Christopher Fauleta66adf42020-11-05 22:43:41 +01001059 if (!http_str_to_htx(&chk, raw, &errmsg)) {
1060 ha_alert("Internal error: invalid default message for HTTP return code %d: %s.\n",
1061 http_err_codes[rc], errmsg);
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001062 err_code |= ERR_ALERT | ERR_FATAL;
1063 }
Christopher Fauleta66adf42020-11-05 22:43:41 +01001064 else if (errmsg) {
1065 ha_warning("invalid default message for HTTP return code %d: %s.\n", http_err_codes[rc], errmsg);
1066 err_code |= ERR_WARN;
1067 }
1068
1069 /* Reset errmsg */
Willy Tarreau61cfdf42021-02-20 10:46:51 +01001070 ha_free(&errmsg);
Christopher Fauleta66adf42020-11-05 22:43:41 +01001071
Christopher Fauletf7346382019-07-17 22:02:08 +02001072 http_err_chunks[rc] = chk;
Christopher Faulet1b13eca2020-05-14 09:54:26 +02001073 http_err_replies[rc].type = HTTP_REPLY_ERRMSG;
1074 http_err_replies[rc].status = http_err_codes[rc];
1075 http_err_replies[rc].ctype = NULL;
1076 LIST_INIT(&http_err_replies[rc].hdrs);
1077 http_err_replies[rc].body.errmsg = &http_err_chunks[rc];
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001078 }
1079end:
1080 return err_code;
1081}
1082
Christopher Faulet58857752020-01-15 15:19:50 +01001083static void http_htx_deinit(void)
1084{
Christopher Faulet35cd81d2020-01-15 11:22:56 +01001085 struct http_errors *http_errs, *http_errsb;
Christopher Faulet5809e102020-05-14 17:31:52 +02001086 struct http_reply *http_rep, *http_repb;
Christopher Faulet58857752020-01-15 15:19:50 +01001087 struct ebpt_node *node, *next;
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001088 struct http_error_msg *http_errmsg;
Christopher Fauletde30bb72020-05-14 10:03:55 +02001089 int rc;
Christopher Faulet58857752020-01-15 15:19:50 +01001090
1091 node = ebpt_first(&http_error_messages);
1092 while (node) {
1093 next = ebpt_next(node);
1094 ebpt_delete(node);
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001095 http_errmsg = container_of(node, typeof(*http_errmsg), node);
1096 chunk_destroy(&http_errmsg->msg);
Christopher Faulet58857752020-01-15 15:19:50 +01001097 free(node->key);
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001098 free(http_errmsg);
Christopher Faulet58857752020-01-15 15:19:50 +01001099 node = next;
1100 }
Christopher Faulet35cd81d2020-01-15 11:22:56 +01001101
1102 list_for_each_entry_safe(http_errs, http_errsb, &http_errors_list, list) {
1103 free(http_errs->conf.file);
1104 free(http_errs->id);
Christopher Fauletde30bb72020-05-14 10:03:55 +02001105 for (rc = 0; rc < HTTP_ERR_SIZE; rc++)
1106 release_http_reply(http_errs->replies[rc]);
Willy Tarreau2b718102021-04-21 07:32:39 +02001107 LIST_DELETE(&http_errs->list);
Christopher Faulet35cd81d2020-01-15 11:22:56 +01001108 free(http_errs);
1109 }
Christopher Faulet5809e102020-05-14 17:31:52 +02001110
1111 list_for_each_entry_safe(http_rep, http_repb, &http_replies_list, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02001112 LIST_DELETE(&http_rep->list);
Christopher Faulet5809e102020-05-14 17:31:52 +02001113 release_http_reply(http_rep);
1114 }
Tim Duesterhus2b7fa9d2022-04-26 23:35:07 +02001115
1116 for (rc = 0; rc < HTTP_ERR_SIZE; rc++)
1117 chunk_destroy(&http_err_chunks[rc]);
Christopher Faulet58857752020-01-15 15:19:50 +01001118}
1119
Christopher Fauleta7b677c2018-11-29 16:48:49 +01001120REGISTER_CONFIG_POSTPARSER("http_htx", http_htx_init);
Christopher Faulet58857752020-01-15 15:19:50 +01001121REGISTER_POST_DEINIT(http_htx_deinit);
Christopher Faulet29f72842019-12-11 15:52:32 +01001122
Christopher Faulet58857752020-01-15 15:19:50 +01001123/* Reads content of the error file <file> and convert it into an HTX message. On
1124 * success, the HTX message is returned. On error, NULL is returned and an error
1125 * message is written into the <errmsg> buffer.
Christopher Faulet5031ef52020-01-15 11:22:07 +01001126 */
Christopher Faulet58857752020-01-15 15:19:50 +01001127struct buffer *http_load_errorfile(const char *file, char **errmsg)
Christopher Faulet5031ef52020-01-15 11:22:07 +01001128{
Christopher Faulet58857752020-01-15 15:19:50 +01001129 struct buffer *buf = NULL;
1130 struct buffer chk;
1131 struct ebpt_node *node;
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001132 struct http_error_msg *http_errmsg;
Christopher Faulet5031ef52020-01-15 11:22:07 +01001133 struct stat stat;
1134 char *err = NULL;
1135 int errnum, errlen;
1136 int fd = -1;
Christopher Faulet58857752020-01-15 15:19:50 +01001137
1138 /* already loaded */
1139 node = ebis_lookup_len(&http_error_messages, file, strlen(file));
1140 if (node) {
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001141 http_errmsg = container_of(node, typeof(*http_errmsg), node);
1142 buf = &http_errmsg->msg;
Christopher Faulet58857752020-01-15 15:19:50 +01001143 goto out;
1144 }
Christopher Faulet5031ef52020-01-15 11:22:07 +01001145
Christopher Faulet58857752020-01-15 15:19:50 +01001146 /* Read the error file content */
Christopher Faulet5031ef52020-01-15 11:22:07 +01001147 fd = open(file, O_RDONLY);
1148 if ((fd < 0) || (fstat(fd, &stat) < 0)) {
1149 memprintf(errmsg, "error opening file '%s'.", file);
1150 goto out;
1151 }
1152
1153 if (stat.st_size <= global.tune.bufsize)
1154 errlen = stat.st_size;
1155 else {
1156 ha_warning("custom error message file '%s' larger than %d bytes. Truncating.\n",
1157 file, global.tune.bufsize);
1158 errlen = global.tune.bufsize;
1159 }
1160
1161 err = malloc(errlen);
1162 if (!err) {
1163 memprintf(errmsg, "out of memory.");
1164 goto out;
1165 }
1166
1167 errnum = read(fd, err, errlen);
1168 if (errnum != errlen) {
1169 memprintf(errmsg, "error reading file '%s'.", file);
1170 goto out;
1171 }
1172
Christopher Faulet58857752020-01-15 15:19:50 +01001173 /* Create the node corresponding to the error file */
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001174 http_errmsg = calloc(1, sizeof(*http_errmsg));
1175 if (!http_errmsg) {
Christopher Faulet58857752020-01-15 15:19:50 +01001176 memprintf(errmsg, "out of memory.");
1177 goto out;
1178 }
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001179 http_errmsg->node.key = strdup(file);
1180 if (!http_errmsg->node.key) {
Christopher Faulet58857752020-01-15 15:19:50 +01001181 memprintf(errmsg, "out of memory.");
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001182 free(http_errmsg);
Christopher Faulet58857752020-01-15 15:19:50 +01001183 goto out;
1184 }
1185
1186 /* Convert the error file into an HTX message */
Christopher Fauleta66adf42020-11-05 22:43:41 +01001187 if (!http_str_to_htx(&chk, ist2(err, errlen), errmsg)) {
1188 memprintf(errmsg, "'%s': %s", file, *errmsg);
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001189 free(http_errmsg->node.key);
1190 free(http_errmsg);
Christopher Faulet5031ef52020-01-15 11:22:07 +01001191 goto out;
1192 }
1193
Christopher Faulet58857752020-01-15 15:19:50 +01001194 /* Insert the node in the tree and return the HTX message */
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001195 http_errmsg->msg = chk;
1196 ebis_insert(&http_error_messages, &http_errmsg->node);
1197 buf = &http_errmsg->msg;
Christopher Faulet58857752020-01-15 15:19:50 +01001198
Christopher Faulet5031ef52020-01-15 11:22:07 +01001199 out:
1200 if (fd >= 0)
1201 close(fd);
1202 free(err);
Christopher Faulet58857752020-01-15 15:19:50 +01001203 return buf;
Christopher Faulet5031ef52020-01-15 11:22:07 +01001204}
1205
Ilya Shipitsind4259502020-04-08 01:07:56 +05001206/* Convert the raw http message <msg> into an HTX message. On success, the HTX
Christopher Faulet58857752020-01-15 15:19:50 +01001207 * message is returned. On error, NULL is returned and an error message is
1208 * written into the <errmsg> buffer.
Christopher Fauletbdf65262020-01-16 15:51:59 +01001209 */
Christopher Faulet58857752020-01-15 15:19:50 +01001210struct buffer *http_load_errormsg(const char *key, const struct ist msg, char **errmsg)
Christopher Fauletbdf65262020-01-16 15:51:59 +01001211{
Christopher Faulet58857752020-01-15 15:19:50 +01001212 struct buffer *buf = NULL;
1213 struct buffer chk;
1214 struct ebpt_node *node;
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001215 struct http_error_msg *http_errmsg;
Christopher Faulet58857752020-01-15 15:19:50 +01001216
1217 /* already loaded */
1218 node = ebis_lookup_len(&http_error_messages, key, strlen(key));
1219 if (node) {
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001220 http_errmsg = container_of(node, typeof(*http_errmsg), node);
1221 buf = &http_errmsg->msg;
Christopher Faulet58857752020-01-15 15:19:50 +01001222 goto out;
1223 }
1224 /* Create the node corresponding to the error file */
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001225 http_errmsg = calloc(1, sizeof(*http_errmsg));
1226 if (!http_errmsg) {
Christopher Faulet58857752020-01-15 15:19:50 +01001227 memprintf(errmsg, "out of memory.");
1228 goto out;
1229 }
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001230 http_errmsg->node.key = strdup(key);
1231 if (!http_errmsg->node.key) {
Christopher Faulet58857752020-01-15 15:19:50 +01001232 memprintf(errmsg, "out of memory.");
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001233 free(http_errmsg);
Christopher Faulet58857752020-01-15 15:19:50 +01001234 goto out;
1235 }
Christopher Fauletbdf65262020-01-16 15:51:59 +01001236
1237 /* Convert the error file into an HTX message */
Christopher Fauleta66adf42020-11-05 22:43:41 +01001238 if (!http_str_to_htx(&chk, msg, errmsg)) {
1239 memprintf(errmsg, "invalid error message: %s", *errmsg);
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001240 free(http_errmsg->node.key);
1241 free(http_errmsg);
Christopher Fauletbdf65262020-01-16 15:51:59 +01001242 goto out;
1243 }
Christopher Fauletbdf65262020-01-16 15:51:59 +01001244
Christopher Faulet58857752020-01-15 15:19:50 +01001245 /* Insert the node in the tree and return the HTX message */
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02001246 http_errmsg->msg = chk;
1247 ebis_insert(&http_error_messages, &http_errmsg->node);
1248 buf = &http_errmsg->msg;
Christopher Fauletbdf65262020-01-16 15:51:59 +01001249 out:
Christopher Faulet58857752020-01-15 15:19:50 +01001250 return buf;
Christopher Fauletbdf65262020-01-16 15:51:59 +01001251}
1252
Christopher Faulet5031ef52020-01-15 11:22:07 +01001253/* This function parses the raw HTTP error file <file> for the status code
Christopher Faulet58857752020-01-15 15:19:50 +01001254 * <status>. It returns NULL if there is any error, otherwise it return the
1255 * corresponding HTX message.
Christopher Faulet5031ef52020-01-15 11:22:07 +01001256 */
Christopher Faulet58857752020-01-15 15:19:50 +01001257struct buffer *http_parse_errorfile(int status, const char *file, char **errmsg)
Christopher Faulet5031ef52020-01-15 11:22:07 +01001258{
Christopher Faulet58857752020-01-15 15:19:50 +01001259 struct buffer *buf = NULL;
1260 int rc;
Christopher Faulet5031ef52020-01-15 11:22:07 +01001261
1262 for (rc = 0; rc < HTTP_ERR_SIZE; rc++) {
1263 if (http_err_codes[rc] == status) {
Christopher Faulet58857752020-01-15 15:19:50 +01001264 buf = http_load_errorfile(file, errmsg);
Christopher Faulet5031ef52020-01-15 11:22:07 +01001265 break;
1266 }
1267 }
1268
1269 if (rc >= HTTP_ERR_SIZE)
1270 memprintf(errmsg, "status code '%d' not handled.", status);
Christopher Faulet58857752020-01-15 15:19:50 +01001271 return buf;
Christopher Fauletbdf65262020-01-16 15:51:59 +01001272}
1273
1274/* This function creates HTX error message corresponding to a redirect message
1275 * for the status code <status>. <url> is used as location url for the
Christopher Faulet58857752020-01-15 15:19:50 +01001276 * redirect. <errloc> is used to know if it is a 302 or a 303 redirect. It
1277 * returns NULL if there is any error, otherwise it return the corresponding HTX
1278 * message.
Christopher Fauletbdf65262020-01-16 15:51:59 +01001279 */
Christopher Faulet58857752020-01-15 15:19:50 +01001280struct buffer *http_parse_errorloc(int errloc, int status, const char *url, char **errmsg)
Christopher Fauletbdf65262020-01-16 15:51:59 +01001281{
Christopher Faulet0bac4cd2020-05-27 10:11:59 +02001282 static const char *HTTP_302 =
1283 "HTTP/1.1 302 Found\r\n"
1284 "Cache-Control: no-cache\r\n"
1285 "Content-length: 0\r\n"
1286 "Location: "; /* not terminated since it will be concatenated with the URL */
1287 static const char *HTTP_303 =
1288 "HTTP/1.1 303 See Other\r\n"
1289 "Cache-Control: no-cache\r\n"
1290 "Content-length: 0\r\n"
1291 "Location: "; /* not terminated since it will be concatenated with the URL */
1292
Christopher Faulet58857752020-01-15 15:19:50 +01001293 struct buffer *buf = NULL;
Christopher Fauletbdf65262020-01-16 15:51:59 +01001294 const char *msg;
Christopher Faulet58857752020-01-15 15:19:50 +01001295 char *key = NULL, *err = NULL;
Christopher Fauletbdf65262020-01-16 15:51:59 +01001296 int rc, errlen;
Christopher Fauletbdf65262020-01-16 15:51:59 +01001297
1298 for (rc = 0; rc < HTTP_ERR_SIZE; rc++) {
1299 if (http_err_codes[rc] == status) {
Christopher Faulet58857752020-01-15 15:19:50 +01001300 /* Create the error key */
1301 if (!memprintf(&key, "errorloc%d %s", errloc, url)) {
1302 memprintf(errmsg, "out of memory.");
1303 goto out;
1304 }
Christopher Fauletbdf65262020-01-16 15:51:59 +01001305 /* Create the error message */
1306 msg = (errloc == 302 ? HTTP_302 : HTTP_303);
1307 errlen = strlen(msg) + strlen(url) + 5;
1308 err = malloc(errlen);
1309 if (!err) {
1310 memprintf(errmsg, "out of memory.");
1311 goto out;
1312 }
1313 errlen = snprintf(err, errlen, "%s%s\r\n\r\n", msg, url);
1314
1315 /* Load it */
Christopher Faulet58857752020-01-15 15:19:50 +01001316 buf = http_load_errormsg(key, ist2(err, errlen), errmsg);
Christopher Fauletbdf65262020-01-16 15:51:59 +01001317 break;
1318 }
1319 }
1320
1321 if (rc >= HTTP_ERR_SIZE)
1322 memprintf(errmsg, "status code '%d' not handled.", status);
1323out:
Christopher Faulet58857752020-01-15 15:19:50 +01001324 free(key);
Christopher Fauletbdf65262020-01-16 15:51:59 +01001325 free(err);
Christopher Faulet58857752020-01-15 15:19:50 +01001326 return buf;
Christopher Faulet5031ef52020-01-15 11:22:07 +01001327}
1328
Christopher Faulet7eea2412020-05-13 15:02:59 +02001329/* Check an "http reply" and, for replies referencing an http-errors section,
1330 * try to find the right section and the right error message in this section. If
1331 * found, the reply is updated. If the http-errors section exists but the error
1332 * message is not found, no error message is set to fallback on the default
1333 * ones. Otherwise (unknown section) an error is returned.
1334 *
1335 * The function returns 1 in success case, otherwise, it returns 0 and errmsg is
1336 * filled.
1337 */
1338int http_check_http_reply(struct http_reply *reply, struct proxy *px, char **errmsg)
1339{
1340 struct http_errors *http_errs;
1341 int ret = 1;
1342
1343 if (reply->type != HTTP_REPLY_ERRFILES)
1344 goto end;
1345
1346 list_for_each_entry(http_errs, &http_errors_list, list) {
1347 if (strcmp(http_errs->id, reply->body.http_errors) == 0) {
Christopher Faulete29a97e2020-05-14 14:49:25 +02001348 reply->type = HTTP_REPLY_INDIRECT;
Christopher Faulet7eea2412020-05-13 15:02:59 +02001349 free(reply->body.http_errors);
Christopher Faulete29a97e2020-05-14 14:49:25 +02001350 reply->body.reply = http_errs->replies[http_get_status_idx(reply->status)];
1351 if (!reply->body.reply)
Christopher Faulet7eea2412020-05-13 15:02:59 +02001352 ha_warning("Proxy '%s': status '%d' referenced by an http reply "
1353 "not declared in http-errors section '%s'.\n",
1354 px->id, reply->status, http_errs->id);
1355 break;
1356 }
1357 }
1358
1359 if (&http_errs->list == &http_errors_list) {
1360 memprintf(errmsg, "unknown http-errors section '%s' referenced by an http reply ",
1361 reply->body.http_errors);
1362 ret = 0;
1363 }
1364
1365 end:
1366 return ret;
1367}
1368
Christopher Faulet47e791e2020-05-13 14:36:55 +02001369/* Parse an "http reply". It returns the reply on success or NULL on error. This
1370 * function creates one of the following http replies :
1371 *
1372 * - HTTP_REPLY_EMPTY : dummy response, no payload
1373 * - HTTP_REPLY_ERRMSG : implicit error message depending on the status code or explicit one
1374 * - HTTP_REPLY_ERRFILES : points on an http-errors section (resolved during post-parsing)
1375 * - HTTP_REPLY_RAW : explicit file object ('file' argument)
1376 * - HTTP_REPLY_LOGFMT : explicit log-format string ('content' argument)
1377 *
1378 * The content-type must be defined for non-empty payload. It is ignored for
1379 * error messages (implicit or explicit). When an http-errors section is
1380 * referenced (HTTP_REPLY_ERRFILES), the real error message should be resolved
1381 * during the configuration validity check or dynamically. It is the caller
1382 * responsibility to choose. If no status code is configured, <default_status>
1383 * is set.
1384 */
1385struct http_reply *http_parse_http_reply(const char **args, int *orig_arg, struct proxy *px,
1386 int default_status, char **errmsg)
1387{
1388 struct logformat_node *lf, *lfb;
1389 struct http_reply *reply = NULL;
1390 struct http_reply_hdr *hdr, *hdrb;
1391 struct stat stat;
1392 const char *act_arg = NULL;
1393 char *obj = NULL;
Christopher Faulet7a06ffb2021-10-13 17:22:17 +02001394 int cur_arg, cap = 0, objlen = 0, fd = -1;
Christopher Faulet47e791e2020-05-13 14:36:55 +02001395
1396
1397 reply = calloc(1, sizeof(*reply));
1398 if (!reply) {
1399 memprintf(errmsg, "out of memory");
1400 goto error;
1401 }
1402 LIST_INIT(&reply->hdrs);
1403 reply->type = HTTP_REPLY_EMPTY;
1404 reply->status = default_status;
1405
Christopher Faulet3b967c12020-05-15 15:47:44 +02001406 if (px->conf.args.ctx == ARGC_HERR)
1407 cap = (SMP_VAL_REQUEST | SMP_VAL_RESPONSE);
Christopher Faulet7a06ffb2021-10-13 17:22:17 +02001408 else {
1409 if (px->cap & PR_CAP_FE)
1410 cap |= ((px->conf.args.ctx == ARGC_HRQ) ? SMP_VAL_FE_HRQ_HDR : SMP_VAL_FE_HRS_HDR);
1411 if (px->cap & PR_CAP_BE)
Willy Tarreaub39e47a2021-10-16 14:41:09 +02001412 cap |= ((px->conf.args.ctx == ARGC_HRQ) ? SMP_VAL_BE_HRQ_HDR : SMP_VAL_BE_HRS_HDR);
Christopher Faulet7a06ffb2021-10-13 17:22:17 +02001413 }
Christopher Faulet47e791e2020-05-13 14:36:55 +02001414
1415 cur_arg = *orig_arg;
1416 while (*args[cur_arg]) {
1417 if (strcmp(args[cur_arg], "status") == 0) {
1418 cur_arg++;
1419 if (!*args[cur_arg]) {
1420 memprintf(errmsg, "'%s' expects <status_code> as argument", args[cur_arg-1]);
1421 goto error;
1422 }
1423 reply->status = atol(args[cur_arg]);
1424 if (reply->status < 200 || reply->status > 599) {
1425 memprintf(errmsg, "Unexpected status code '%d'", reply->status);
1426 goto error;
1427 }
1428 cur_arg++;
1429 }
1430 else if (strcmp(args[cur_arg], "content-type") == 0) {
1431 cur_arg++;
1432 if (!*args[cur_arg]) {
1433 memprintf(errmsg, "'%s' expects <ctype> as argument", args[cur_arg-1]);
1434 goto error;
1435 }
1436 free(reply->ctype);
1437 reply->ctype = strdup(args[cur_arg]);
1438 cur_arg++;
1439 }
1440 else if (strcmp(args[cur_arg], "errorfiles") == 0) {
1441 if (reply->type != HTTP_REPLY_EMPTY) {
1442 memprintf(errmsg, "unexpected '%s' argument, '%s' already defined", args[cur_arg], act_arg);
1443 goto error;
1444 }
1445 act_arg = args[cur_arg];
1446 cur_arg++;
1447 if (!*args[cur_arg]) {
1448 memprintf(errmsg, "'%s' expects <name> as argument", args[cur_arg-1]);
1449 goto error;
1450 }
1451 reply->body.http_errors = strdup(args[cur_arg]);
1452 if (!reply->body.http_errors) {
1453 memprintf(errmsg, "out of memory");
1454 goto error;
1455 }
1456 reply->type = HTTP_REPLY_ERRFILES;
1457 cur_arg++;
1458 }
1459 else if (strcmp(args[cur_arg], "default-errorfiles") == 0) {
1460 if (reply->type != HTTP_REPLY_EMPTY) {
1461 memprintf(errmsg, "unexpected '%s' argument, '%s' already defined", args[cur_arg], act_arg);
1462 goto error;
1463 }
1464 act_arg = args[cur_arg];
1465 reply->type = HTTP_REPLY_ERRMSG;
1466 cur_arg++;
1467 }
1468 else if (strcmp(args[cur_arg], "errorfile") == 0) {
1469 if (reply->type != HTTP_REPLY_EMPTY) {
1470 memprintf(errmsg, "unexpected '%s' argument, '%s' already defined", args[cur_arg], act_arg);
1471 goto error;
1472 }
1473 act_arg = args[cur_arg];
1474 cur_arg++;
1475 if (!*args[cur_arg]) {
1476 memprintf(errmsg, "'%s' expects <fmt> as argument", args[cur_arg-1]);
1477 goto error;
1478 }
1479 reply->body.errmsg = http_load_errorfile(args[cur_arg], errmsg);
1480 if (!reply->body.errmsg) {
1481 goto error;
1482 }
1483 reply->type = HTTP_REPLY_ERRMSG;
1484 cur_arg++;
1485 }
1486 else if (strcmp(args[cur_arg], "file") == 0) {
1487 if (reply->type != HTTP_REPLY_EMPTY) {
1488 memprintf(errmsg, "unexpected '%s' argument, '%s' already defined", args[cur_arg], act_arg);
1489 goto error;
1490 }
1491 act_arg = args[cur_arg];
1492 cur_arg++;
1493 if (!*args[cur_arg]) {
1494 memprintf(errmsg, "'%s' expects <file> as argument", args[cur_arg-1]);
1495 goto error;
1496 }
1497 fd = open(args[cur_arg], O_RDONLY);
1498 if ((fd < 0) || (fstat(fd, &stat) < 0)) {
1499 memprintf(errmsg, "error opening file '%s'", args[cur_arg]);
1500 goto error;
1501 }
1502 if (stat.st_size > global.tune.bufsize) {
1503 memprintf(errmsg, "file '%s' exceeds the buffer size (%lld > %d)",
1504 args[cur_arg], (long long)stat.st_size, global.tune.bufsize);
1505 goto error;
1506 }
1507 objlen = stat.st_size;
1508 obj = malloc(objlen);
1509 if (!obj || read(fd, obj, objlen) != objlen) {
1510 memprintf(errmsg, "error reading file '%s'", args[cur_arg]);
1511 goto error;
1512 }
1513 close(fd);
1514 fd = -1;
1515 reply->type = HTTP_REPLY_RAW;
1516 chunk_initlen(&reply->body.obj, obj, global.tune.bufsize, objlen);
1517 obj = NULL;
1518 cur_arg++;
1519 }
1520 else if (strcmp(args[cur_arg], "string") == 0) {
1521 if (reply->type != HTTP_REPLY_EMPTY) {
1522 memprintf(errmsg, "unexpected '%s' argument, '%s' already defined", args[cur_arg], act_arg);
1523 goto error;
1524 }
1525 act_arg = args[cur_arg];
1526 cur_arg++;
1527 if (!*args[cur_arg]) {
1528 memprintf(errmsg, "'%s' expects <str> as argument", args[cur_arg-1]);
1529 goto error;
1530 }
1531 obj = strdup(args[cur_arg]);
1532 objlen = strlen(args[cur_arg]);
1533 if (!obj) {
1534 memprintf(errmsg, "out of memory");
1535 goto error;
1536 }
1537 reply->type = HTTP_REPLY_RAW;
1538 chunk_initlen(&reply->body.obj, obj, global.tune.bufsize, objlen);
1539 obj = NULL;
1540 cur_arg++;
1541 }
1542 else if (strcmp(args[cur_arg], "lf-file") == 0) {
1543 if (reply->type != HTTP_REPLY_EMPTY) {
1544 memprintf(errmsg, "unexpected '%s' argument, '%s' already defined", args[cur_arg], act_arg);
1545 goto error;
1546 }
1547 act_arg = args[cur_arg];
1548 cur_arg++;
1549 if (!*args[cur_arg]) {
1550 memprintf(errmsg, "'%s' expects <file> as argument", args[cur_arg-1]);
1551 goto error;
1552 }
1553 fd = open(args[cur_arg], O_RDONLY);
1554 if ((fd < 0) || (fstat(fd, &stat) < 0)) {
1555 memprintf(errmsg, "error opening file '%s'", args[cur_arg]);
1556 goto error;
1557 }
1558 if (stat.st_size > global.tune.bufsize) {
1559 memprintf(errmsg, "file '%s' exceeds the buffer size (%lld > %d)",
1560 args[cur_arg], (long long)stat.st_size, global.tune.bufsize);
1561 goto error;
1562 }
1563 objlen = stat.st_size;
1564 obj = malloc(objlen + 1);
1565 if (!obj || read(fd, obj, objlen) != objlen) {
1566 memprintf(errmsg, "error reading file '%s'", args[cur_arg]);
1567 goto error;
1568 }
1569 close(fd);
1570 fd = -1;
1571 obj[objlen] = '\0';
1572 reply->type = HTTP_REPLY_LOGFMT;
1573 cur_arg++;
1574 }
1575 else if (strcmp(args[cur_arg], "lf-string") == 0) {
1576 if (reply->type != HTTP_REPLY_EMPTY) {
1577 memprintf(errmsg, "unexpected '%s' argument, '%s' already defined", args[cur_arg], act_arg);
1578 goto error;
1579 }
1580 act_arg = args[cur_arg];
1581 cur_arg++;
1582 if (!*args[cur_arg]) {
1583 memprintf(errmsg, "'%s' expects <fmt> as argument", args[cur_arg-1]);
1584 goto error;
1585 }
1586 obj = strdup(args[cur_arg]);
1587 objlen = strlen(args[cur_arg]);
1588 reply->type = HTTP_REPLY_LOGFMT;
1589 cur_arg++;
1590 }
1591 else if (strcmp(args[cur_arg], "hdr") == 0) {
1592 cur_arg++;
1593 if (!*args[cur_arg] || !*args[cur_arg+1]) {
1594 memprintf(errmsg, "'%s' expects <name> and <value> as arguments", args[cur_arg-1]);
1595 goto error;
1596 }
1597 if (strcasecmp(args[cur_arg], "content-length") == 0 ||
1598 strcasecmp(args[cur_arg], "transfer-encoding") == 0 ||
1599 strcasecmp(args[cur_arg], "content-type") == 0) {
1600 ha_warning("parsing [%s:%d] : header '%s' always ignored by the http reply.\n",
1601 px->conf.args.file, px->conf.args.line, args[cur_arg]);
1602 cur_arg += 2;
1603 continue;
1604 }
1605 hdr = calloc(1, sizeof(*hdr));
1606 if (!hdr) {
1607 memprintf(errmsg, "'%s' : out of memory", args[cur_arg-1]);
1608 goto error;
1609 }
Willy Tarreau2b718102021-04-21 07:32:39 +02001610 LIST_APPEND(&reply->hdrs, &hdr->list);
Christopher Faulet47e791e2020-05-13 14:36:55 +02001611 LIST_INIT(&hdr->value);
1612 hdr->name = ist(strdup(args[cur_arg]));
1613 if (!isttest(hdr->name)) {
1614 memprintf(errmsg, "out of memory");
1615 goto error;
1616 }
Christopher Faulet47e791e2020-05-13 14:36:55 +02001617 if (!parse_logformat_string(args[cur_arg+1], px, &hdr->value, LOG_OPT_HTTP, cap, errmsg))
1618 goto error;
1619
1620 free(px->conf.lfs_file);
1621 px->conf.lfs_file = strdup(px->conf.args.file);
1622 px->conf.lfs_line = px->conf.args.line;
1623 cur_arg += 2;
1624 }
1625 else
1626 break;
1627 }
1628
1629 if (reply->type == HTTP_REPLY_EMPTY) { /* no payload */
1630 if (reply->ctype) {
1631 ha_warning("parsing [%s:%d] : content-type '%s' ignored by the http reply because"
1632 " neither errorfile nor payload defined.\n",
1633 px->conf.args.file, px->conf.args.line, reply->ctype);
Willy Tarreau61cfdf42021-02-20 10:46:51 +01001634 ha_free(&reply->ctype);
Christopher Faulet47e791e2020-05-13 14:36:55 +02001635 }
1636 }
1637 else if (reply->type == HTTP_REPLY_ERRFILES || reply->type == HTTP_REPLY_ERRMSG) { /* errorfiles or errorfile */
1638
1639 if (reply->type != HTTP_REPLY_ERRMSG || !reply->body.errmsg) {
1640 /* default errorfile or errorfiles: check the status */
1641 int rc;
1642
1643 for (rc = 0; rc < HTTP_ERR_SIZE; rc++) {
1644 if (http_err_codes[rc] == reply->status)
1645 break;
1646 }
1647
1648 if (rc >= HTTP_ERR_SIZE) {
1649 memprintf(errmsg, "status code '%d' not handled by default with '%s' argument.",
1650 reply->status, act_arg);
1651 goto error;
1652 }
1653 }
1654
1655 if (reply->ctype) {
1656 ha_warning("parsing [%s:%d] : content-type '%s' ignored by the http reply when used "
1657 "with an erorrfile.\n",
1658 px->conf.args.file, px->conf.args.line, reply->ctype);
Willy Tarreau61cfdf42021-02-20 10:46:51 +01001659 ha_free(&reply->ctype);
Christopher Faulet47e791e2020-05-13 14:36:55 +02001660 }
1661 if (!LIST_ISEMPTY(&reply->hdrs)) {
1662 ha_warning("parsing [%s:%d] : hdr parameters ignored by the http reply when used "
1663 "with an erorrfile.\n",
1664 px->conf.args.file, px->conf.args.line);
1665 list_for_each_entry_safe(hdr, hdrb, &reply->hdrs, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02001666 LIST_DELETE(&hdr->list);
Christopher Faulet47e791e2020-05-13 14:36:55 +02001667 list_for_each_entry_safe(lf, lfb, &hdr->value, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02001668 LIST_DELETE(&lf->list);
Christopher Faulet47e791e2020-05-13 14:36:55 +02001669 release_sample_expr(lf->expr);
1670 free(lf->arg);
1671 free(lf);
1672 }
1673 istfree(&hdr->name);
1674 free(hdr);
1675 }
1676 }
1677 }
1678 else if (reply->type == HTTP_REPLY_RAW) { /* explicit parameter using 'file' parameter*/
Christopher Fauletb8d148a2020-10-09 08:50:26 +02001679 if ((reply->status == 204 || reply->status == 304) && objlen) {
1680 memprintf(errmsg, "No body expected for %d responses", reply->status);
1681 goto error;
1682 }
Christopher Faulet47e791e2020-05-13 14:36:55 +02001683 if (!reply->ctype && objlen) {
1684 memprintf(errmsg, "a content type must be defined when non-empty payload is configured");
1685 goto error;
1686 }
1687 if (reply->ctype && !b_data(&reply->body.obj)) {
1688 ha_warning("parsing [%s:%d] : content-type '%s' ignored by the http reply when used "
Ilya Shipitsin47d17182020-06-21 21:42:57 +05001689 "with an empty payload.\n",
Christopher Faulet47e791e2020-05-13 14:36:55 +02001690 px->conf.args.file, px->conf.args.line, reply->ctype);
Willy Tarreau61cfdf42021-02-20 10:46:51 +01001691 ha_free(&reply->ctype);
Christopher Faulet47e791e2020-05-13 14:36:55 +02001692 }
1693 if (b_room(&reply->body.obj) < global.tune.maxrewrite) {
1694 ha_warning("parsing [%s:%d] : http reply payload runs over the buffer space reserved to headers rewriting."
1695 " It may lead to internal errors if strict rewriting mode is enabled.\n",
1696 px->conf.args.file, px->conf.args.line);
1697 }
1698 }
1699 else if (reply->type == HTTP_REPLY_LOGFMT) { /* log-format payload using 'lf-file' of 'lf-string' parameter */
1700 LIST_INIT(&reply->body.fmt);
Christopher Fauletb8d148a2020-10-09 08:50:26 +02001701 if ((reply->status == 204 || reply->status == 304)) {
1702 memprintf(errmsg, "No body expected for %d responses", reply->status);
1703 goto error;
1704 }
Christopher Faulet47e791e2020-05-13 14:36:55 +02001705 if (!reply->ctype) {
1706 memprintf(errmsg, "a content type must be defined with a log-format payload");
1707 goto error;
1708 }
1709 if (!parse_logformat_string(obj, px, &reply->body.fmt, LOG_OPT_HTTP, cap, errmsg))
1710 goto error;
1711
1712 free(px->conf.lfs_file);
1713 px->conf.lfs_file = strdup(px->conf.args.file);
1714 px->conf.lfs_line = px->conf.args.line;
1715 }
1716
1717 free(obj);
1718 *orig_arg = cur_arg;
1719 return reply;
1720
1721 error:
1722 free(obj);
1723 if (fd >= 0)
1724 close(fd);
1725 release_http_reply(reply);
1726 return NULL;
1727}
1728
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +02001729static int uri_is_default_port(const struct ist scheme, const struct ist port)
1730{
1731 return (isteq(port, ist("443")) && isteqi(scheme, ist("https://"))) ||
1732 (isteq(port, ist("80")) && isteqi(scheme, ist("http://")));
1733}
1734
1735/* Apply schemed-based normalization as described on rfc3986 on section 6.3.2.
1736 * Returns 0 if no error has been found else non-zero.
1737 *
1738 * The normalization is processed on the target-uri at the condition that it is
1739 * in absolute-form. In the case where the target-uri was normalized, every
1740 * host headers values found are also replaced by the normalized hostname. This
1741 * assumes that the target-uri and host headers were properly identify as
1742 * similar before calling this function.
1743 */
1744int http_scheme_based_normalize(struct htx *htx)
1745{
1746 struct http_hdr_ctx ctx;
1747 struct htx_sl *sl;
1748 struct ist uri, scheme, authority, host, port;
1749 char *start, *end, *ptr;
Amaury Denoyelle8ac8cbf2021-07-06 10:52:58 +02001750 struct http_uri_parser parser;
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +02001751
1752 sl = http_get_stline(htx);
1753
1754 if (!sl || !(sl->flags & (HTX_SL_F_HAS_SCHM|HTX_SL_F_HAS_AUTHORITY)))
1755 return 0;
1756
1757 uri = htx_sl_req_uri(sl);
1758
Amaury Denoyelle8ac8cbf2021-07-06 10:52:58 +02001759 parser = http_uri_parser_init(uri);
1760 scheme = http_parse_scheme(&parser);
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +02001761 /* if no scheme found, no normalization to proceed */
1762 if (!isttest(scheme))
1763 return 0;
1764
1765 /* Extract the port if present in authority. To properly support ipv6
1766 * hostnames, do a reverse search on the last ':' separator as long as
1767 * digits are found.
1768 */
Amaury Denoyelle69294b22021-07-06 11:02:22 +02001769 authority = http_parse_authority(&parser, 0);
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +02001770 start = istptr(authority);
1771 end = istend(authority);
Amaury Denoyelle164ae4a2021-07-07 17:17:39 +02001772 for (ptr = end; ptr > start && isdigit((unsigned char)*--ptr); )
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +02001773 ;
1774
1775 /* if no port found, no normalization to proceed */
1776 if (likely(*ptr != ':'))
1777 return 0;
1778
1779 /* split host/port on the ':' separator found */
1780 host = ist2(start, ptr - start);
1781 port = istnext(ist2(ptr, end - ptr));
1782
1783 if (istlen(port) && uri_is_default_port(scheme, port)) {
1784 /* reconstruct the uri with removal of the port */
1785 struct buffer *temp = get_trash_chunk();
Christopher Faulet0eab0502022-07-06 17:41:31 +02001786 struct ist meth, vsn;
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +02001787
1788 /* meth */
1789 chunk_memcat(temp, HTX_SL_REQ_MPTR(sl), HTX_SL_REQ_MLEN(sl));
1790 meth = ist2(temp->area, HTX_SL_REQ_MLEN(sl));
1791
1792 /* vsn */
1793 chunk_memcat(temp, HTX_SL_REQ_VPTR(sl), HTX_SL_REQ_VLEN(sl));
1794 vsn = ist2(temp->area + meth.len, HTX_SL_REQ_VLEN(sl));
1795
1796 /* reconstruct uri without port */
Christopher Faulet0eab0502022-07-06 17:41:31 +02001797 chunk_memcat(temp, uri.ptr, authority.ptr - uri.ptr);
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +02001798 chunk_istcat(temp, host);
Christopher Faulet0eab0502022-07-06 17:41:31 +02001799 chunk_memcat(temp, istend(authority), istend(uri) - istend(authority));
1800 uri = ist2(temp->area + meth.len + vsn.len, host.len + uri.len - authority.len); /* uri */
Amaury Denoyelle4c0882b2021-07-07 10:49:26 +02001801
1802 http_replace_stline(htx, meth, uri, vsn);
1803
1804 /* replace every host headers values by the normalized host */
1805 ctx.blk = NULL;
1806 while (http_find_header(htx, ist("host"), &ctx, 0)) {
1807 if (!http_replace_header_value(htx, &ctx, host))
1808 goto fail;
1809 }
1810 }
1811
1812 return 0;
1813
1814 fail:
1815 return 1;
1816}
1817
Christopher Faulet07f41f72020-01-16 16:16:06 +01001818/* Parses the "errorloc[302|303]" proxy keyword */
1819static int proxy_parse_errorloc(char **args, int section, struct proxy *curpx,
Willy Tarreau01825162021-03-09 09:53:46 +01001820 const struct proxy *defpx, const char *file, int line,
Christopher Faulet07f41f72020-01-16 16:16:06 +01001821 char **errmsg)
1822{
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001823 struct conf_errors *conf_err;
Christopher Faulet5809e102020-05-14 17:31:52 +02001824 struct http_reply *reply;
Christopher Faulet07f41f72020-01-16 16:16:06 +01001825 struct buffer *msg;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001826 int errloc, status;
1827 int ret = 0;
Christopher Faulet07f41f72020-01-16 16:16:06 +01001828
1829 if (warnifnotcap(curpx, PR_CAP_FE | PR_CAP_BE, file, line, args[0], NULL)) {
1830 ret = 1;
1831 goto out;
1832 }
1833
1834 if (*(args[1]) == 0 || *(args[2]) == 0) {
1835 memprintf(errmsg, "%s : expects <status_code> and <url> as arguments.\n", args[0]);
1836 ret = -1;
1837 goto out;
1838 }
1839
1840 status = atol(args[1]);
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01001841 errloc = (strcmp(args[0], "errorloc303") == 0 ? 303 : 302);
Christopher Faulet07f41f72020-01-16 16:16:06 +01001842 msg = http_parse_errorloc(errloc, status, args[2], errmsg);
1843 if (!msg) {
1844 memprintf(errmsg, "%s : %s", args[0], *errmsg);
1845 ret = -1;
1846 goto out;
1847 }
Christopher Faulet5809e102020-05-14 17:31:52 +02001848
1849 reply = calloc(1, sizeof(*reply));
1850 if (!reply) {
1851 memprintf(errmsg, "%s : out of memory.", args[0]);
1852 ret = -1;
1853 goto out;
1854 }
1855 reply->type = HTTP_REPLY_ERRMSG;
1856 reply->status = status;
1857 reply->ctype = NULL;
1858 LIST_INIT(&reply->hdrs);
1859 reply->body.errmsg = msg;
Willy Tarreau2b718102021-04-21 07:32:39 +02001860 LIST_APPEND(&http_replies_list, &reply->list);
Christopher Faulet07f41f72020-01-16 16:16:06 +01001861
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001862 conf_err = calloc(1, sizeof(*conf_err));
1863 if (!conf_err) {
1864 memprintf(errmsg, "%s : out of memory.", args[0]);
Christopher Faulet5809e102020-05-14 17:31:52 +02001865 free(reply);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001866 ret = -1;
1867 goto out;
1868 }
1869 conf_err->type = 1;
1870 conf_err->info.errorfile.status = status;
Christopher Faulet5809e102020-05-14 17:31:52 +02001871 conf_err->info.errorfile.reply = reply;
1872
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001873 conf_err->file = strdup(file);
1874 conf_err->line = line;
Willy Tarreau2b718102021-04-21 07:32:39 +02001875 LIST_APPEND(&curpx->conf.errors, &conf_err->list);
Christopher Faulet07f41f72020-01-16 16:16:06 +01001876
Christopher Fauleta66adf42020-11-05 22:43:41 +01001877 /* handle warning message */
1878 if (*errmsg)
1879 ret = 1;
Christopher Faulet07f41f72020-01-16 16:16:06 +01001880 out:
1881 return ret;
Christopher Faulet07f41f72020-01-16 16:16:06 +01001882
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001883}
Christopher Faulet07f41f72020-01-16 16:16:06 +01001884
1885/* Parses the "errorfile" proxy keyword */
1886static int proxy_parse_errorfile(char **args, int section, struct proxy *curpx,
Willy Tarreau01825162021-03-09 09:53:46 +01001887 const struct proxy *defpx, const char *file, int line,
Christopher Faulet07f41f72020-01-16 16:16:06 +01001888 char **errmsg)
1889{
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001890 struct conf_errors *conf_err;
Christopher Faulet5809e102020-05-14 17:31:52 +02001891 struct http_reply *reply;
Christopher Faulet07f41f72020-01-16 16:16:06 +01001892 struct buffer *msg;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001893 int status;
1894 int ret = 0;
Christopher Faulet07f41f72020-01-16 16:16:06 +01001895
1896 if (warnifnotcap(curpx, PR_CAP_FE | PR_CAP_BE, file, line, args[0], NULL)) {
1897 ret = 1;
1898 goto out;
1899 }
1900
1901 if (*(args[1]) == 0 || *(args[2]) == 0) {
1902 memprintf(errmsg, "%s : expects <status_code> and <file> as arguments.\n", args[0]);
1903 ret = -1;
1904 goto out;
1905 }
1906
1907 status = atol(args[1]);
1908 msg = http_parse_errorfile(status, args[2], errmsg);
1909 if (!msg) {
1910 memprintf(errmsg, "%s : %s", args[0], *errmsg);
1911 ret = -1;
1912 goto out;
1913 }
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001914
Christopher Faulet5809e102020-05-14 17:31:52 +02001915 reply = calloc(1, sizeof(*reply));
1916 if (!reply) {
1917 memprintf(errmsg, "%s : out of memory.", args[0]);
1918 ret = -1;
1919 goto out;
1920 }
1921 reply->type = HTTP_REPLY_ERRMSG;
1922 reply->status = status;
1923 reply->ctype = NULL;
1924 LIST_INIT(&reply->hdrs);
1925 reply->body.errmsg = msg;
Willy Tarreau2b718102021-04-21 07:32:39 +02001926 LIST_APPEND(&http_replies_list, &reply->list);
Christopher Faulet5809e102020-05-14 17:31:52 +02001927
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001928 conf_err = calloc(1, sizeof(*conf_err));
1929 if (!conf_err) {
1930 memprintf(errmsg, "%s : out of memory.", args[0]);
Christopher Faulet5809e102020-05-14 17:31:52 +02001931 free(reply);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001932 ret = -1;
1933 goto out;
1934 }
1935 conf_err->type = 1;
1936 conf_err->info.errorfile.status = status;
Christopher Faulet5809e102020-05-14 17:31:52 +02001937 conf_err->info.errorfile.reply = reply;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001938 conf_err->file = strdup(file);
1939 conf_err->line = line;
Willy Tarreau2b718102021-04-21 07:32:39 +02001940 LIST_APPEND(&curpx->conf.errors, &conf_err->list);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001941
Christopher Fauleta66adf42020-11-05 22:43:41 +01001942 /* handle warning message */
1943 if (*errmsg)
1944 ret = 1;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001945 out:
1946 return ret;
1947
1948}
1949
1950/* Parses the "errorfiles" proxy keyword */
1951static int proxy_parse_errorfiles(char **args, int section, struct proxy *curpx,
Willy Tarreau01825162021-03-09 09:53:46 +01001952 const struct proxy *defpx, const char *file, int line,
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001953 char **err)
1954{
1955 struct conf_errors *conf_err = NULL;
1956 char *name = NULL;
1957 int rc, ret = 0;
1958
1959 if (warnifnotcap(curpx, PR_CAP_FE | PR_CAP_BE, file, line, args[0], NULL)) {
1960 ret = 1;
1961 goto out;
1962 }
1963
1964 if (!*(args[1])) {
1965 memprintf(err, "%s : expects <name> as argument.", args[0]);
1966 ret = -1;
1967 goto out;
1968 }
1969
1970 name = strdup(args[1]);
1971 conf_err = calloc(1, sizeof(*conf_err));
1972 if (!name || !conf_err) {
1973 memprintf(err, "%s : out of memory.", args[0]);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001974 goto error;
1975 }
1976 conf_err->type = 0;
1977
1978 conf_err->info.errorfiles.name = name;
1979 if (!*(args[2])) {
1980 for (rc = 0; rc < HTTP_ERR_SIZE; rc++)
1981 conf_err->info.errorfiles.status[rc] = 1;
1982 }
1983 else {
1984 int cur_arg, status;
1985 for (cur_arg = 2; *(args[cur_arg]); cur_arg++) {
1986 status = atol(args[cur_arg]);
1987
1988 for (rc = 0; rc < HTTP_ERR_SIZE; rc++) {
1989 if (http_err_codes[rc] == status) {
1990 conf_err->info.errorfiles.status[rc] = 2;
1991 break;
1992 }
1993 }
1994 if (rc >= HTTP_ERR_SIZE) {
1995 memprintf(err, "%s : status code '%d' not handled.", args[0], status);
Christopher Faulet7cde96c2020-01-21 10:10:11 +01001996 goto error;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01001997 }
1998 }
1999 }
2000 conf_err->file = strdup(file);
2001 conf_err->line = line;
Willy Tarreau2b718102021-04-21 07:32:39 +02002002 LIST_APPEND(&curpx->conf.errors, &conf_err->list);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002003 out:
2004 return ret;
2005
2006 error:
2007 free(name);
2008 free(conf_err);
Christopher Faulet7cde96c2020-01-21 10:10:11 +01002009 ret = -1;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002010 goto out;
2011}
2012
Christopher Faulet3b967c12020-05-15 15:47:44 +02002013/* Parses the "http-error" proxy keyword */
2014static int proxy_parse_http_error(char **args, int section, struct proxy *curpx,
Willy Tarreau01825162021-03-09 09:53:46 +01002015 const struct proxy *defpx, const char *file, int line,
Christopher Faulet3b967c12020-05-15 15:47:44 +02002016 char **errmsg)
2017{
2018 struct conf_errors *conf_err;
2019 struct http_reply *reply = NULL;
2020 int rc, cur_arg, ret = 0;
2021
2022 if (warnifnotcap(curpx, PR_CAP_FE | PR_CAP_BE, file, line, args[0], NULL)) {
2023 ret = 1;
2024 goto out;
2025 }
2026
2027 cur_arg = 1;
2028 curpx->conf.args.ctx = ARGC_HERR;
2029 reply = http_parse_http_reply((const char **)args, &cur_arg, curpx, 0, errmsg);
2030 if (!reply) {
2031 memprintf(errmsg, "%s : %s", args[0], *errmsg);
2032 goto error;
2033 }
2034 else if (!reply->status) {
2035 memprintf(errmsg, "%s : expects at least a <status> as arguments.\n", args[0]);
2036 goto error;
2037 }
2038
2039 for (rc = 0; rc < HTTP_ERR_SIZE; rc++) {
2040 if (http_err_codes[rc] == reply->status)
2041 break;
2042 }
2043
2044 if (rc >= HTTP_ERR_SIZE) {
2045 memprintf(errmsg, "%s: status code '%d' not handled.", args[0], reply->status);
2046 goto error;
2047 }
2048 if (*args[cur_arg]) {
2049 memprintf(errmsg, "%s : unknown keyword '%s'.", args[0], args[cur_arg]);
2050 goto error;
2051 }
2052
2053 conf_err = calloc(1, sizeof(*conf_err));
2054 if (!conf_err) {
2055 memprintf(errmsg, "%s : out of memory.", args[0]);
2056 goto error;
2057 }
2058 if (reply->type == HTTP_REPLY_ERRFILES) {
2059 int rc = http_get_status_idx(reply->status);
2060
2061 conf_err->type = 2;
2062 conf_err->info.errorfiles.name = reply->body.http_errors;
2063 conf_err->info.errorfiles.status[rc] = 2;
2064 reply->body.http_errors = NULL;
2065 release_http_reply(reply);
2066 }
2067 else {
2068 conf_err->type = 1;
2069 conf_err->info.errorfile.status = reply->status;
2070 conf_err->info.errorfile.reply = reply;
Willy Tarreau2b718102021-04-21 07:32:39 +02002071 LIST_APPEND(&http_replies_list, &reply->list);
Christopher Faulet3b967c12020-05-15 15:47:44 +02002072 }
2073 conf_err->file = strdup(file);
2074 conf_err->line = line;
Willy Tarreau2b718102021-04-21 07:32:39 +02002075 LIST_APPEND(&curpx->conf.errors, &conf_err->list);
Christopher Faulet3b967c12020-05-15 15:47:44 +02002076
Christopher Faulet3005d282020-11-13 10:58:01 +01002077 /* handle warning message */
2078 if (*errmsg)
2079 ret = 1;
Christopher Faulet3b967c12020-05-15 15:47:44 +02002080 out:
2081 return ret;
2082
2083 error:
2084 release_http_reply(reply);
2085 ret = -1;
2086 goto out;
2087
2088}
2089
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002090/* Check "errorfiles" proxy keyword */
2091static int proxy_check_errors(struct proxy *px)
2092{
2093 struct conf_errors *conf_err, *conf_err_back;
2094 struct http_errors *http_errs;
Christopher Fauletfc633b62020-11-06 15:24:23 +01002095 int rc, err = ERR_NONE;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002096
2097 list_for_each_entry_safe(conf_err, conf_err_back, &px->conf.errors, list) {
2098 if (conf_err->type == 1) {
2099 /* errorfile */
2100 rc = http_get_status_idx(conf_err->info.errorfile.status);
Christopher Faulet40e85692020-05-14 17:34:31 +02002101 px->replies[rc] = conf_err->info.errorfile.reply;
Christopher Faulet3b967c12020-05-15 15:47:44 +02002102
2103 /* For proxy, to rely on default replies, just don't reference a reply */
2104 if (px->replies[rc]->type == HTTP_REPLY_ERRMSG && !px->replies[rc]->body.errmsg)
2105 px->replies[rc] = NULL;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002106 }
2107 else {
2108 /* errorfiles */
2109 list_for_each_entry(http_errs, &http_errors_list, list) {
2110 if (strcmp(http_errs->id, conf_err->info.errorfiles.name) == 0)
2111 break;
2112 }
Christopher Faulet07f41f72020-01-16 16:16:06 +01002113
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002114 /* unknown http-errors section */
2115 if (&http_errs->list == &http_errors_list) {
Amaury Denoyelle11124302021-06-04 18:22:08 +02002116 ha_alert("proxy '%s': unknown http-errors section '%s' (at %s:%d).\n",
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002117 px->id, conf_err->info.errorfiles.name, conf_err->file, conf_err->line);
2118 err |= ERR_ALERT | ERR_FATAL;
2119 free(conf_err->info.errorfiles.name);
2120 goto next;
2121 }
2122
2123 free(conf_err->info.errorfiles.name);
2124 for (rc = 0; rc < HTTP_ERR_SIZE; rc++) {
2125 if (conf_err->info.errorfiles.status[rc] > 0) {
Christopher Fauletf1fedc32020-05-15 14:30:32 +02002126 if (http_errs->replies[rc])
Christopher Faulet40e85692020-05-14 17:34:31 +02002127 px->replies[rc] = http_errs->replies[rc];
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002128 else if (conf_err->info.errorfiles.status[rc] == 2)
2129 ha_warning("config: proxy '%s' : status '%d' not declared in"
2130 " http-errors section '%s' (at %s:%d).\n",
2131 px->id, http_err_codes[rc], http_errs->id,
2132 conf_err->file, conf_err->line);
2133 }
2134 }
2135 }
2136 next:
Willy Tarreau2b718102021-04-21 07:32:39 +02002137 LIST_DELETE(&conf_err->list);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002138 free(conf_err->file);
2139 free(conf_err);
2140 }
Christopher Faulet07f41f72020-01-16 16:16:06 +01002141
2142 out:
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002143 return err;
2144}
2145
Christopher Faulet0a589fd2020-01-22 14:47:04 +01002146static int post_check_errors()
2147{
2148 struct ebpt_node *node;
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02002149 struct http_error_msg *http_errmsg;
Christopher Faulet0a589fd2020-01-22 14:47:04 +01002150 struct htx *htx;
Christopher Fauletfc633b62020-11-06 15:24:23 +01002151 int err_code = ERR_NONE;
Christopher Faulet0a589fd2020-01-22 14:47:04 +01002152
2153 node = ebpt_first(&http_error_messages);
2154 while (node) {
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02002155 http_errmsg = container_of(node, typeof(*http_errmsg), node);
2156 if (b_is_null(&http_errmsg->msg))
Christopher Faulet0a589fd2020-01-22 14:47:04 +01002157 goto next;
Christopher Fauletb6ea17c2020-05-13 21:45:22 +02002158 htx = htxbuf(&http_errmsg->msg);
Christopher Faulet0a589fd2020-01-22 14:47:04 +01002159 if (htx_free_data_space(htx) < global.tune.maxrewrite) {
2160 ha_warning("config: errorfile '%s' runs over the buffer space"
Ilya Shipitsin47d17182020-06-21 21:42:57 +05002161 " reserved to headers rewriting. It may lead to internal errors if "
Christopher Faulet6d0c3df2020-01-22 09:26:35 +01002162 " http-after-response rules are evaluated on this message.\n",
Christopher Faulet0a589fd2020-01-22 14:47:04 +01002163 (char *)node->key);
2164 err_code |= ERR_WARN;
2165 }
2166 next:
2167 node = ebpt_next(node);
2168 }
2169
2170 return err_code;
2171}
2172
Willy Tarreau016255a2021-02-12 08:40:29 +01002173int proxy_dup_default_conf_errors(struct proxy *curpx, const struct proxy *defpx, char **errmsg)
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002174{
2175 struct conf_errors *conf_err, *new_conf_err = NULL;
2176 int ret = 0;
2177
2178 list_for_each_entry(conf_err, &defpx->conf.errors, list) {
2179 new_conf_err = calloc(1, sizeof(*new_conf_err));
2180 if (!new_conf_err) {
2181 memprintf(errmsg, "unable to duplicate default errors (out of memory).");
2182 goto out;
2183 }
2184 new_conf_err->type = conf_err->type;
2185 if (conf_err->type == 1) {
2186 new_conf_err->info.errorfile.status = conf_err->info.errorfile.status;
Christopher Faulet40e85692020-05-14 17:34:31 +02002187 new_conf_err->info.errorfile.reply = conf_err->info.errorfile.reply;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002188 }
2189 else {
2190 new_conf_err->info.errorfiles.name = strdup(conf_err->info.errorfiles.name);
2191 if (!new_conf_err->info.errorfiles.name) {
2192 memprintf(errmsg, "unable to duplicate default errors (out of memory).");
2193 goto out;
2194 }
2195 memcpy(&new_conf_err->info.errorfiles.status, &conf_err->info.errorfiles.status,
2196 sizeof(conf_err->info.errorfiles.status));
2197 }
2198 new_conf_err->file = strdup(conf_err->file);
2199 new_conf_err->line = conf_err->line;
Willy Tarreau2b718102021-04-21 07:32:39 +02002200 LIST_APPEND(&curpx->conf.errors, &new_conf_err->list);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002201 new_conf_err = NULL;
2202 }
2203 ret = 1;
2204
2205 out:
2206 free(new_conf_err);
Christopher Faulet07f41f72020-01-16 16:16:06 +01002207 return ret;
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002208}
2209
2210void proxy_release_conf_errors(struct proxy *px)
2211{
2212 struct conf_errors *conf_err, *conf_err_back;
Christopher Faulet07f41f72020-01-16 16:16:06 +01002213
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002214 list_for_each_entry_safe(conf_err, conf_err_back, &px->conf.errors, list) {
2215 if (conf_err->type == 0)
2216 free(conf_err->info.errorfiles.name);
Willy Tarreau2b718102021-04-21 07:32:39 +02002217 LIST_DELETE(&conf_err->list);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002218 free(conf_err->file);
2219 free(conf_err);
2220 }
Christopher Faulet35cd81d2020-01-15 11:22:56 +01002221}
2222
2223/*
2224 * Parse an <http-errors> section.
2225 * Returns the error code, 0 if OK, or any combination of :
2226 * - ERR_ABORT: must abort ASAP
2227 * - ERR_FATAL: we can continue parsing but not start the service
2228 * - ERR_WARN: a warning has been emitted
2229 * - ERR_ALERT: an alert has been emitted
2230 * Only the two first ones can stop processing, the two others are just
2231 * indicators.
2232 */
2233static int cfg_parse_http_errors(const char *file, int linenum, char **args, int kwm)
2234{
2235 static struct http_errors *curr_errs = NULL;
2236 int err_code = 0;
2237 const char *err;
2238 char *errmsg = NULL;
2239
2240 if (strcmp(args[0], "http-errors") == 0) { /* new errors section */
2241 if (!*args[1]) {
2242 ha_alert("parsing [%s:%d] : missing name for http-errors section.\n", file, linenum);
2243 err_code |= ERR_ALERT | ERR_ABORT;
2244 goto out;
2245 }
2246
2247 err = invalid_char(args[1]);
2248 if (err) {
2249 ha_alert("parsing [%s:%d] : character '%c' is not permitted in '%s' name '%s'.\n",
2250 file, linenum, *err, args[0], args[1]);
2251 err_code |= ERR_ALERT | ERR_FATAL;
2252 }
2253
2254 list_for_each_entry(curr_errs, &http_errors_list, list) {
2255 /* Error if two errors section owns the same name */
2256 if (strcmp(curr_errs->id, args[1]) == 0) {
2257 ha_alert("parsing [%s:%d]: http-errors section '%s' already exists (declared at %s:%d).\n",
2258 file, linenum, args[1], curr_errs->conf.file, curr_errs->conf.line);
2259 err_code |= ERR_ALERT | ERR_FATAL;
2260 }
2261 }
2262
2263 if ((curr_errs = calloc(1, sizeof(*curr_errs))) == NULL) {
2264 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
2265 err_code |= ERR_ALERT | ERR_ABORT;
2266 goto out;
2267 }
2268
Willy Tarreau2b718102021-04-21 07:32:39 +02002269 LIST_APPEND(&http_errors_list, &curr_errs->list);
Christopher Faulet35cd81d2020-01-15 11:22:56 +01002270 curr_errs->id = strdup(args[1]);
2271 curr_errs->conf.file = strdup(file);
2272 curr_errs->conf.line = linenum;
2273 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01002274 else if (strcmp(args[0], "errorfile") == 0) { /* error message from a file */
Christopher Fauletde30bb72020-05-14 10:03:55 +02002275 struct http_reply *reply;
Christopher Faulet35cd81d2020-01-15 11:22:56 +01002276 struct buffer *msg;
2277 int status, rc;
2278
2279 if (*(args[1]) == 0 || *(args[2]) == 0) {
2280 ha_alert("parsing [%s:%d] : %s: expects <status_code> and <file> as arguments.\n",
2281 file, linenum, args[0]);
2282 err_code |= ERR_ALERT | ERR_FATAL;
2283 goto out;
2284 }
2285
2286 status = atol(args[1]);
2287 msg = http_parse_errorfile(status, args[2], &errmsg);
2288 if (!msg) {
2289 ha_alert("parsing [%s:%d] : %s : %s\n", file, linenum, args[0], errmsg);
2290 err_code |= ERR_ALERT | ERR_FATAL;
2291 goto out;
2292 }
Christopher Faulet3005d282020-11-13 10:58:01 +01002293 if (errmsg) {
2294 ha_warning("parsing [%s:%d] : %s: %s\n", file, linenum, args[0], errmsg);
2295 err_code |= ERR_WARN;
2296 }
Christopher Fauletde30bb72020-05-14 10:03:55 +02002297
2298 reply = calloc(1, sizeof(*reply));
2299 if (!reply) {
2300 ha_alert("parsing [%s:%d] : %s : out of memory.\n", file, linenum, args[0]);
2301 err_code |= ERR_ALERT | ERR_FATAL;
2302 goto out;
2303 }
2304 reply->type = HTTP_REPLY_ERRMSG;
2305 reply->status = status;
2306 reply->ctype = NULL;
2307 LIST_INIT(&reply->hdrs);
2308 reply->body.errmsg = msg;
2309
Christopher Faulet35cd81d2020-01-15 11:22:56 +01002310 rc = http_get_status_idx(status);
Christopher Fauletde30bb72020-05-14 10:03:55 +02002311 curr_errs->replies[rc] = reply;
Christopher Faulet35cd81d2020-01-15 11:22:56 +01002312 }
2313 else if (*args[0] != 0) {
2314 ha_alert("parsing [%s:%d] : unknown keyword '%s' in '%s' section\n", file, linenum, args[0], cursection);
2315 err_code |= ERR_ALERT | ERR_FATAL;
2316 goto out;
2317 }
2318
2319out:
2320 free(errmsg);
2321 return err_code;
Christopher Faulet07f41f72020-01-16 16:16:06 +01002322}
2323
2324static struct cfg_kw_list cfg_kws = {ILH, {
2325 { CFG_LISTEN, "errorloc", proxy_parse_errorloc },
2326 { CFG_LISTEN, "errorloc302", proxy_parse_errorloc },
2327 { CFG_LISTEN, "errorloc303", proxy_parse_errorloc },
2328 { CFG_LISTEN, "errorfile", proxy_parse_errorfile },
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002329 { CFG_LISTEN, "errorfiles", proxy_parse_errorfiles },
Christopher Faulet3b967c12020-05-15 15:47:44 +02002330 { CFG_LISTEN, "http-error", proxy_parse_http_error },
Christopher Faulet07f41f72020-01-16 16:16:06 +01002331 { 0, NULL, NULL },
2332}};
2333
2334INITCALL1(STG_REGISTER, cfg_register_keywords, &cfg_kws);
Christopher Faulet76edc0f2020-01-13 15:52:01 +01002335REGISTER_POST_PROXY_CHECK(proxy_check_errors);
Christopher Faulet0a589fd2020-01-22 14:47:04 +01002336REGISTER_POST_CHECK(post_check_errors);
Christopher Faulet07f41f72020-01-16 16:16:06 +01002337
Christopher Faulet35cd81d2020-01-15 11:22:56 +01002338REGISTER_CONFIG_SECTION("http-errors", cfg_parse_http_errors, NULL);
2339
Christopher Faulet29f72842019-12-11 15:52:32 +01002340/************************************************************************/
2341/* HTX sample fetches */
2342/************************************************************************/
2343
2344/* Returns 1 if a stream is an HTX stream. Otherwise, it returns 0. */
2345static int
2346smp_fetch_is_htx(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2347{
2348 if (!smp->strm)
2349 return 0;
2350
2351 smp->data.u.sint = !!IS_HTX_STRM(smp->strm);
2352 smp->data.type = SMP_T_BOOL;
2353 return 1;
2354}
2355
2356/* Returns the number of blocks in an HTX message. The channel is chosen
2357 * depending on the sample direction. */
2358static int
2359smp_fetch_htx_nbblks(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2360{
2361 struct channel *chn;
2362 struct htx *htx;
2363
2364 if (!smp->strm)
2365 return 0;
2366
2367 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002368 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002369 if (!htx)
2370 return 0;
2371
2372 smp->data.u.sint = htx_nbblks(htx);
2373 smp->data.type = SMP_T_SINT;
2374 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2375 return 1;
2376}
2377
2378/* Returns the size of an HTX message. The channel is chosen depending on the
2379 * sample direction. */
2380static int
2381smp_fetch_htx_size(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2382{
2383 struct channel *chn;
2384 struct htx *htx;
2385
2386 if (!smp->strm)
2387 return 0;
2388
2389 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002390 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002391 if (!htx)
2392 return 0;
2393
2394 smp->data.u.sint = htx->size;
2395 smp->data.type = SMP_T_SINT;
2396 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2397 return 1;
2398}
2399
2400/* Returns the data size of an HTX message. The channel is chosen depending on the
2401 * sample direction. */
2402static int
2403smp_fetch_htx_data(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2404{
2405 struct channel *chn;
2406 struct htx *htx;
2407
2408 if (!smp->strm)
2409 return 0;
2410
2411 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002412 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002413 if (!htx)
2414 return 0;
2415
2416 smp->data.u.sint = htx->data;
2417 smp->data.type = SMP_T_SINT;
2418 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2419 return 1;
2420}
2421
2422/* Returns the used space (data+meta) of an HTX message. The channel is chosen
2423 * depending on the sample direction. */
2424static int
2425smp_fetch_htx_used(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2426{
2427 struct channel *chn;
2428 struct htx *htx;
2429
2430 if (!smp->strm)
2431 return 0;
2432
2433 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002434 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002435 if (!htx)
2436 return 0;
2437
2438 smp->data.u.sint = htx_used_space(htx);
2439 smp->data.type = SMP_T_SINT;
2440 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2441 return 1;
2442}
2443
2444/* Returns the free space (size-used) of an HTX message. The channel is chosen
2445 * depending on the sample direction. */
2446static int
2447smp_fetch_htx_free(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2448{
2449 struct channel *chn;
2450 struct htx *htx;
2451
2452 if (!smp->strm)
2453 return 0;
2454
2455 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002456 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002457 if (!htx)
2458 return 0;
2459
2460 smp->data.u.sint = htx_free_space(htx);
2461 smp->data.type = SMP_T_SINT;
2462 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2463 return 1;
2464}
2465
2466/* Returns the free space for data (free-sizeof(blk)) of an HTX message. The
2467 * channel is chosen depending on the sample direction. */
2468static int
2469smp_fetch_htx_free_data(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2470{
2471 struct channel *chn;
2472 struct htx *htx;
2473
2474 if (!smp->strm)
2475 return 0;
2476
2477 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002478 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002479 if (!htx)
2480 return 0;
2481
2482 smp->data.u.sint = htx_free_data_space(htx);
2483 smp->data.type = SMP_T_SINT;
2484 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2485 return 1;
2486}
2487
Christopher Fauletd1ac2b92020-12-02 19:12:22 +01002488/* Returns 1 if the HTX message contains EOM flag. Otherwise it returns 0. The
2489 * channel is chosen depending on the sample direction.
2490 */
Christopher Faulet29f72842019-12-11 15:52:32 +01002491static int
2492smp_fetch_htx_has_eom(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2493{
2494 struct channel *chn;
2495 struct htx *htx;
2496
2497 if (!smp->strm)
2498 return 0;
2499
2500 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002501 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002502 if (!htx)
2503 return 0;
2504
Christopher Fauletd1ac2b92020-12-02 19:12:22 +01002505 smp->data.u.sint = !!(htx->flags & HTX_FL_EOM);
Christopher Faulet29f72842019-12-11 15:52:32 +01002506 smp->data.type = SMP_T_BOOL;
2507 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2508 return 1;
2509}
2510
2511/* Returns the type of a specific HTX block, if found in the message. Otherwise
2512 * HTX_BLK_UNUSED is returned. Any positive integer (>= 0) is supported or
2513 * "head", "tail" or "first". The channel is chosen depending on the sample
2514 * direction. */
2515static int
2516smp_fetch_htx_blk_type(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2517{
2518 struct channel *chn;
2519 struct htx *htx;
2520 enum htx_blk_type type;
2521 int32_t pos;
2522
2523 if (!smp->strm || !arg_p)
2524 return 0;
2525
2526 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002527 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002528 if (!htx)
2529 return 0;
2530
2531 pos = arg_p[0].data.sint;
2532 if (pos == -1)
2533 type = htx_get_head_type(htx);
2534 else if (pos == -2)
2535 type = htx_get_tail_type(htx);
2536 else if (pos == -3)
2537 type = htx_get_first_type(htx);
2538 else
2539 type = ((pos >= htx->head && pos <= htx->tail)
2540 ? htx_get_blk_type(htx_get_blk(htx, pos))
2541 : HTX_BLK_UNUSED);
2542
2543 chunk_initstr(&smp->data.u.str, htx_blk_type_str(type));
2544 smp->data.type = SMP_T_STR;
2545 smp->flags = SMP_F_CONST | SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2546 return 1;
2547}
2548
2549/* Returns the size of a specific HTX block, if found in the message. Otherwise
2550 * 0 is returned. Any positive integer (>= 0) is supported or "head", "tail" or
2551 * "first". The channel is chosen depending on the sample direction. */
2552static int
2553smp_fetch_htx_blk_size(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2554{
2555 struct channel *chn;
2556 struct htx *htx;
2557 struct htx_blk *blk;
2558 int32_t pos;
2559
2560 if (!smp->strm || !arg_p)
2561 return 0;
2562
2563 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002564 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002565 if (!htx)
2566 return 0;
2567
2568 pos = arg_p[0].data.sint;
2569 if (pos == -1)
2570 blk = htx_get_head_blk(htx);
2571 else if (pos == -2)
2572 blk = htx_get_tail_blk(htx);
2573 else if (pos == -3)
2574 blk = htx_get_first_blk(htx);
2575 else
2576 blk = ((pos >= htx->head && pos <= htx->tail) ? htx_get_blk(htx, pos) : NULL);
2577
2578 smp->data.u.sint = (blk ? htx_get_blksz(blk) : 0);
2579 smp->data.type = SMP_T_SINT;
2580 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2581 return 1;
2582}
2583
2584/* Returns the start-line if the selected HTX block exists and is a
2585 * start-line. Otherwise 0 an empty string. Any positive integer (>= 0) is
2586 * supported or "head", "tail" or "first". The channel is chosen depending on
2587 * the sample direction. */
2588static int
2589smp_fetch_htx_blk_stline(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2590{
2591 struct buffer *temp;
2592 struct channel *chn;
2593 struct htx *htx;
2594 struct htx_blk *blk;
2595 struct htx_sl *sl;
2596 int32_t pos;
2597
2598 if (!smp->strm || !arg_p)
2599 return 0;
2600
2601 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002602 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002603 if (!htx)
2604 return 0;
2605
2606 pos = arg_p[0].data.sint;
2607 if (pos == -1)
2608 blk = htx_get_head_blk(htx);
2609 else if (pos == -2)
2610 blk = htx_get_tail_blk(htx);
2611 else if (pos == -3)
2612 blk = htx_get_first_blk(htx);
2613 else
2614 blk = ((pos >= htx->head && pos <= htx->tail) ? htx_get_blk(htx, pos) : NULL);
2615
2616 if (!blk || (htx_get_blk_type(blk) != HTX_BLK_REQ_SL && htx_get_blk_type(blk) != HTX_BLK_RES_SL)) {
2617 smp->data.u.str.size = 0;
2618 smp->data.u.str.area = "";
2619 smp->data.u.str.data = 0;
2620 }
2621 else {
2622 sl = htx_get_blk_ptr(htx, blk);
2623
2624 temp = get_trash_chunk();
2625 chunk_istcat(temp, htx_sl_p1(sl));
2626 temp->area[temp->data++] = ' ';
2627 chunk_istcat(temp, htx_sl_p2(sl));
2628 temp->area[temp->data++] = ' ';
2629 chunk_istcat(temp, htx_sl_p3(sl));
2630
2631 smp->data.u.str = *temp;
2632 }
2633
2634 smp->data.type = SMP_T_STR;
2635 smp->flags = SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2636 return 1;
2637}
2638
2639/* Returns the header name if the selected HTX block exists and is a header or a
2640 * trailer. Otherwise 0 an empty string. Any positive integer (>= 0) is
2641 * supported or "head", "tail" or "first". The channel is chosen depending on
2642 * the sample direction. */
2643static int
2644smp_fetch_htx_blk_hdrname(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2645{
2646 struct channel *chn;
2647 struct htx *htx;
2648 struct htx_blk *blk;
2649 int32_t pos;
2650
2651 if (!smp->strm || !arg_p)
2652 return 0;
2653
2654 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002655 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002656 if (!htx)
2657 return 0;
2658
2659 pos = arg_p[0].data.sint;
2660 if (pos == -1)
2661 blk = htx_get_head_blk(htx);
2662 else if (pos == -2)
2663 blk = htx_get_tail_blk(htx);
2664 else if (pos == -3)
2665 blk = htx_get_first_blk(htx);
2666 else
2667 blk = ((pos >= htx->head && pos <= htx->tail) ? htx_get_blk(htx, pos) : NULL);
2668
2669 if (!blk || (htx_get_blk_type(blk) != HTX_BLK_HDR && htx_get_blk_type(blk) != HTX_BLK_TLR)) {
2670 smp->data.u.str.size = 0;
2671 smp->data.u.str.area = "";
2672 smp->data.u.str.data = 0;
2673 }
2674 else {
2675 struct ist name = htx_get_blk_name(htx, blk);
2676
2677 chunk_initlen(&smp->data.u.str, name.ptr, name.len, name.len);
2678 }
2679 smp->data.type = SMP_T_STR;
2680 smp->flags = SMP_F_CONST | SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2681 return 1;
2682}
2683
2684/* Returns the header value if the selected HTX block exists and is a header or
2685 * a trailer. Otherwise 0 an empty string. Any positive integer (>= 0) is
2686 * supported or "head", "tail" or "first". The channel is chosen depending on
2687 * the sample direction. */
2688static int
2689smp_fetch_htx_blk_hdrval(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
2690{
2691 struct channel *chn;
2692 struct htx *htx;
2693 struct htx_blk *blk;
2694 int32_t pos;
2695
2696 if (!smp->strm || !arg_p)
2697 return 0;
2698
2699 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002700 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002701 if (!htx)
2702 return 0;
2703
2704 pos = arg_p[0].data.sint;
2705 if (pos == -1)
2706 blk = htx_get_head_blk(htx);
2707 else if (pos == -2)
2708 blk = htx_get_tail_blk(htx);
2709 else if (pos == -3)
2710 blk = htx_get_first_blk(htx);
2711 else
2712 blk = ((pos >= htx->head && pos <= htx->tail) ? htx_get_blk(htx, pos) : NULL);
2713
2714 if (!blk || (htx_get_blk_type(blk) != HTX_BLK_HDR && htx_get_blk_type(blk) != HTX_BLK_TLR)) {
2715 smp->data.u.str.size = 0;
2716 smp->data.u.str.area = "";
2717 smp->data.u.str.data = 0;
2718 }
2719 else {
2720 struct ist val = htx_get_blk_value(htx, blk);
2721
2722 chunk_initlen(&smp->data.u.str, val.ptr, val.len, val.len);
2723 }
2724 smp->data.type = SMP_T_STR;
2725 smp->flags = SMP_F_CONST | SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2726 return 1;
2727}
2728
2729/* Returns the value if the selected HTX block exists and is a data
2730 * block. Otherwise 0 an empty string. Any positive integer (>= 0) is supported
2731 * or "head", "tail" or "first". The channel is chosen depending on the sample
2732 * direction. */
2733static int
Christopher Fauletc5db14c2020-01-08 14:51:03 +01002734smp_fetch_htx_blk_data(const struct arg *arg_p, struct sample *smp, const char *kw, void *private)
Christopher Faulet29f72842019-12-11 15:52:32 +01002735{
2736 struct channel *chn;
2737 struct htx *htx;
2738 struct htx_blk *blk;
2739 int32_t pos;
2740
2741 if (!smp->strm || !arg_p)
2742 return 0;
2743
2744 chn = ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_RES) ? &smp->strm->res : &smp->strm->req;
Christopher Faulet778f5ed2020-04-29 15:51:55 +02002745 htx = smp_prefetch_htx(smp, chn, NULL, 0);
Christopher Faulet29f72842019-12-11 15:52:32 +01002746 if (!htx)
2747 return 0;
2748
2749 pos = arg_p[0].data.sint;
2750 if (pos == -1)
2751 blk = htx_get_head_blk(htx);
2752 else if (pos == -2)
2753 blk = htx_get_tail_blk(htx);
2754 else if (pos == -3)
2755 blk = htx_get_first_blk(htx);
2756 else
2757 blk = ((pos >= htx->head && pos <= htx->tail) ? htx_get_blk(htx, pos) : NULL);
2758
2759 if (!blk || htx_get_blk_type(blk) != HTX_BLK_DATA) {
2760 smp->data.u.str.size = 0;
2761 smp->data.u.str.area = "";
2762 smp->data.u.str.data = 0;
2763 }
2764 else {
2765 struct ist val = htx_get_blk_value(htx, blk);
2766
2767 chunk_initlen(&smp->data.u.str, val.ptr, val.len, val.len);
2768 }
Christopher Faulet8178e402020-01-08 14:38:58 +01002769 smp->data.type = SMP_T_BIN;
Christopher Faulet29f72842019-12-11 15:52:32 +01002770 smp->flags = SMP_F_CONST | SMP_F_VOLATILE | SMP_F_MAY_CHANGE;
2771 return 1;
2772}
2773
2774/* This function is used to validate the arguments passed to any "htx_blk" fetch
2775 * keywords. An argument is expected by these keywords. It must be a positive
2776 * integer or on of the following strings: "head", "tail" or "first". It returns
2777 * 0 on error, and a non-zero value if OK.
2778 */
2779int val_blk_arg(struct arg *arg, char **err_msg)
2780{
2781 if (arg[0].type != ARGT_STR || !arg[0].data.str.data) {
2782 memprintf(err_msg, "a block position is expected (> 0) or a special block name (head, tail, first)");
2783 return 0;
2784 }
2785 if (arg[0].data.str.data == 4 && !strncmp(arg[0].data.str.area, "head", 4)) {
Christopher Faulet6ad7df42020-08-07 11:45:18 +02002786 chunk_destroy(&arg[0].data.str);
Christopher Faulet29f72842019-12-11 15:52:32 +01002787 arg[0].type = ARGT_SINT;
2788 arg[0].data.sint = -1;
2789 }
2790 else if (arg[0].data.str.data == 4 && !strncmp(arg[0].data.str.area, "tail", 4)) {
Christopher Faulet6ad7df42020-08-07 11:45:18 +02002791 chunk_destroy(&arg[0].data.str);
Christopher Faulet29f72842019-12-11 15:52:32 +01002792 arg[0].type = ARGT_SINT;
2793 arg[0].data.sint = -2;
2794 }
2795 else if (arg[0].data.str.data == 5 && !strncmp(arg[0].data.str.area, "first", 5)) {
Christopher Faulet6ad7df42020-08-07 11:45:18 +02002796 chunk_destroy(&arg[0].data.str);
Christopher Faulet29f72842019-12-11 15:52:32 +01002797 arg[0].type = ARGT_SINT;
2798 arg[0].data.sint = -3;
2799 }
2800 else {
2801 int pos;
2802
2803 for (pos = 0; pos < arg[0].data.str.data; pos++) {
Willy Tarreau90807112020-02-25 08:16:33 +01002804 if (!isdigit((unsigned char)arg[0].data.str.area[pos])) {
Christopher Faulet29f72842019-12-11 15:52:32 +01002805 memprintf(err_msg, "invalid block position");
2806 return 0;
2807 }
2808 }
2809
2810 pos = strl2uic(arg[0].data.str.area, arg[0].data.str.data);
2811 if (pos < 0) {
2812 memprintf(err_msg, "block position must not be negative");
2813 return 0;
2814 }
Christopher Faulet6ad7df42020-08-07 11:45:18 +02002815 chunk_destroy(&arg[0].data.str);
Christopher Faulet29f72842019-12-11 15:52:32 +01002816 arg[0].type = ARGT_SINT;
2817 arg[0].data.sint = pos;
2818 }
2819
2820 return 1;
2821}
2822
2823
2824/* Note: must not be declared <const> as its list will be overwritten.
Ilya Shipitsind4259502020-04-08 01:07:56 +05002825 * Note: htx sample fetches should only used for development purpose.
Christopher Faulet29f72842019-12-11 15:52:32 +01002826 */
2827static struct sample_fetch_kw_list sample_fetch_keywords = {ILH, {
Christopher Faulet2e961942021-03-25 17:29:38 +01002828 { "internal.strm.is_htx", smp_fetch_is_htx, 0, NULL, SMP_T_BOOL, SMP_USE_INTRN },
Christopher Faulet29f72842019-12-11 15:52:32 +01002829
Christopher Faulet01f44452020-01-08 14:23:40 +01002830 { "internal.htx.nbblks", smp_fetch_htx_nbblks, 0, NULL, SMP_T_SINT, SMP_USE_HRQHV|SMP_USE_HRSHV},
2831 { "internal.htx.size", smp_fetch_htx_size, 0, NULL, SMP_T_SINT, SMP_USE_HRQHV|SMP_USE_HRSHV},
2832 { "internal.htx.data", smp_fetch_htx_data, 0, NULL, SMP_T_SINT, SMP_USE_HRQHV|SMP_USE_HRSHV},
2833 { "internal.htx.used", smp_fetch_htx_used, 0, NULL, SMP_T_SINT, SMP_USE_HRQHV|SMP_USE_HRSHV},
2834 { "internal.htx.free", smp_fetch_htx_free, 0, NULL, SMP_T_SINT, SMP_USE_HRQHV|SMP_USE_HRSHV},
2835 { "internal.htx.free_data", smp_fetch_htx_free_data, 0, NULL, SMP_T_SINT, SMP_USE_HRQHV|SMP_USE_HRSHV},
2836 { "internal.htx.has_eom", smp_fetch_htx_has_eom, 0, NULL, SMP_T_BOOL, SMP_USE_HRQHV|SMP_USE_HRSHV},
Christopher Faulet29f72842019-12-11 15:52:32 +01002837
Christopher Faulet01f44452020-01-08 14:23:40 +01002838 { "internal.htx_blk.type", smp_fetch_htx_blk_type, ARG1(1,STR), val_blk_arg, SMP_T_STR, SMP_USE_HRQHV|SMP_USE_HRSHV},
2839 { "internal.htx_blk.size", smp_fetch_htx_blk_size, ARG1(1,STR), val_blk_arg, SMP_T_SINT, SMP_USE_HRQHV|SMP_USE_HRSHV},
2840 { "internal.htx_blk.start_line", smp_fetch_htx_blk_stline, ARG1(1,STR), val_blk_arg, SMP_T_STR, SMP_USE_HRQHV|SMP_USE_HRSHV},
2841 { "internal.htx_blk.hdrname", smp_fetch_htx_blk_hdrname, ARG1(1,STR), val_blk_arg, SMP_T_STR, SMP_USE_HRQHV|SMP_USE_HRSHV},
2842 { "internal.htx_blk.hdrval", smp_fetch_htx_blk_hdrval, ARG1(1,STR), val_blk_arg, SMP_T_STR, SMP_USE_HRQHV|SMP_USE_HRSHV},
Christopher Fauletc5db14c2020-01-08 14:51:03 +01002843 { "internal.htx_blk.data", smp_fetch_htx_blk_data, ARG1(1,STR), val_blk_arg, SMP_T_BIN, SMP_USE_HRQHV|SMP_USE_HRSHV},
Christopher Faulet29f72842019-12-11 15:52:32 +01002844
2845 { /* END */ },
2846}};
2847
2848INITCALL1(STG_REGISTER, sample_register_fetches, &sample_fetch_keywords);