blob: 53c00f71e7743f9398d0bc0e28c5c0d5e04d0ef4 [file] [log] [blame]
Willy Tarreaubaaee002006-06-26 02:48:02 +02001/*
Willy Tarreau5b4c2b52009-10-03 11:21:53 +02002 * include/types/proxy.h
3 * This file defines everything related to proxies.
4 *
Willy Tarreaudeb9ed82010-01-03 21:03:22 +01005 * Copyright (C) 2000-2010 Willy Tarreau - w@1wt.eu
Willy Tarreau5b4c2b52009-10-03 11:21:53 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
Willy Tarreaubaaee002006-06-26 02:48:02 +020021
22#ifndef _TYPES_PROXY_H
23#define _TYPES_PROXY_H
24
Willy Tarreau7d677682006-10-15 23:18:47 +020025#include <sys/types.h>
26#include <sys/socket.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020027#include <netinet/in.h>
28#include <arpa/inet.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020029
Willy Tarreau2dd0d472006-06-29 17:53:05 +020030#include <common/appsession.h>
Willy Tarreaue3ba5f02006-06-29 18:54:54 +020031#include <common/config.h>
Willy Tarreau2dd0d472006-06-29 17:53:05 +020032#include <common/mini-clist.h>
33#include <common/regex.h>
Willy Tarreau51041c72007-09-09 21:56:53 +020034#include <common/sessionhash.h>
Willy Tarreaua8cff1d2007-04-09 16:10:57 +020035#include <common/tools.h>
Willy Tarreau45cb4fb2009-10-26 21:10:04 +010036#include <eb32tree.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020037
Willy Tarreaueb0c6142007-05-07 00:53:22 +020038#include <types/acl.h>
Emeric Brunb982a3d2010-01-04 15:45:53 +010039#include <types/pattern.h>
Willy Tarreau5b4c2b52009-10-03 11:21:53 +020040#include <types/backend.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020041#include <types/buffers.h>
Krzysztof Piotr Oledzki052d4fd2009-10-04 14:52:57 +020042#include <types/counters.h>
Willy Tarreau7f062c42009-03-05 18:43:00 +010043#include <types/freq_ctr.h>
Willy Tarreau0f772532006-12-23 20:51:41 +010044#include <types/httperr.h>
Robert Tsai81ae1952007-12-05 10:47:29 +010045#include <types/log.h>
Willy Tarreaudd815982007-10-16 12:25:14 +020046#include <types/protocols.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020047#include <types/session.h>
48#include <types/server.h>
Emeric Brunb982a3d2010-01-04 15:45:53 +010049#include <types/stick_table.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020050
51/* values for proxy->state */
52#define PR_STNEW 0
53#define PR_STIDLE 1
54#define PR_STRUN 2
55#define PR_STSTOPPED 3
56#define PR_STPAUSED 4
57#define PR_STERROR 5
58
59/* values for proxy->mode */
60#define PR_MODE_TCP 0
61#define PR_MODE_HTTP 1
62#define PR_MODE_HEALTH 2
63
Willy Tarreau977b8e42006-12-29 14:19:17 +010064/* flag values for proxy->cap. This is a bitmask of capabilities supported by the proxy */
65#define PR_CAP_NONE 0x0000
66#define PR_CAP_FE 0x0001
67#define PR_CAP_BE 0x0002
68#define PR_CAP_RS 0x0004
69#define PR_CAP_LISTEN (PR_CAP_FE|PR_CAP_BE|PR_CAP_RS)
70
Willy Tarreau31682232007-11-29 15:38:04 +010071/* bits for proxy->options */
72#define PR_O_REDISP 0x00000001 /* allow reconnection to dispatch in case of errors */
73#define PR_O_TRANSP 0x00000002 /* transparent mode : use original DEST as dispatch */
74#define PR_O_COOK_RW 0x00000004 /* rewrite all direct cookies with the right serverid */
75#define PR_O_COOK_IND 0x00000008 /* keep only indirect cookies */
76#define PR_O_COOK_INS 0x00000010 /* insert cookies when not accessing a server directly */
77#define PR_O_COOK_PFX 0x00000020 /* rewrite all cookies by prefixing the right serverid */
78#define PR_O_COOK_ANY (PR_O_COOK_RW | PR_O_COOK_IND | PR_O_COOK_INS | PR_O_COOK_PFX)
79#define PR_O_SMTP_CHK 0x00000040 /* use SMTP EHLO check for server health - pvandijk@vision6.com.au */
80#define PR_O_KEEPALIVE 0x00000080 /* follow keep-alive sessions */
81#define PR_O_FWDFOR 0x00000100 /* insert x-forwarded-for with client address */
82#define PR_O_BIND_SRC 0x00000200 /* bind to a specific source address when connect()ing */
83#define PR_O_NULLNOLOG 0x00000400 /* a connect without request will not be logged */
84#define PR_O_COOK_NOC 0x00000800 /* add a 'Cache-control' header with the cookie */
85#define PR_O_COOK_POST 0x00001000 /* don't insert cookies for requests other than a POST */
86#define PR_O_HTTP_CHK 0x00002000 /* use HTTP 'OPTIONS' method to check server health */
87#define PR_O_PERSIST 0x00004000 /* server persistence stays effective even when server is down */
88#define PR_O_LOGASAP 0x00008000 /* log as soon as possible, without waiting for the session to complete */
89#define PR_O_HTTP_CLOSE 0x00010000 /* force 'connection: close' in both directions */
90#define PR_O_CHK_CACHE 0x00020000 /* require examination of cacheability of the 'set-cookie' field */
91#define PR_O_TCP_CLI_KA 0x00040000 /* enable TCP keep-alive on client-side sessions */
92#define PR_O_TCP_SRV_KA 0x00080000 /* enable TCP keep-alive on server-side sessions */
93#define PR_O_USE_ALL_BK 0x00100000 /* load-balance between backup servers */
94#define PR_O_FORCE_CLO 0x00200000 /* enforce the connection close immediately after server response */
95#define PR_O_TCP_NOLING 0x00400000 /* disable lingering on client and server connections */
96#define PR_O_ABRT_CLOSE 0x00800000 /* immediately abort request when client closes */
97#define PR_O_SSL3_CHK 0x01000000 /* use SSLv3 CLIENT_HELLO packets for server health */
98
99/* TPXY: exclusive values */
100#define PR_O_TPXY_ADDR 0x02000000 /* bind to this non-local address when connect()ing */
101#define PR_O_TPXY_CIP 0x04000000 /* bind to the client's IP address when connect()ing */
102#define PR_O_TPXY_CLI 0x06000000 /* bind to the client's IP+port when connect()ing */
103#define PR_O_TPXY_MASK 0x06000000 /* bind to a non-local address when connect()ing */
104
Willy Tarreaub608feb2010-01-02 22:47:18 +0100105#define PR_O_SERVER_CLO 0x08000000 /* option http-server-close */
Willy Tarreau31682232007-11-29 15:38:04 +0100106#define PR_O_CONTSTATS 0x10000000 /* continous counters */
Alexandre Cassen5eb1a902007-11-29 15:43:32 +0100107#define PR_O_HTTP_PROXY 0x20000000 /* Enable session to use HTTP proxy operations */
Willy Tarreau48494c02007-11-30 10:41:39 +0100108#define PR_O_DISABLE404 0x40000000 /* Disable a server on a 404 response to a health-check */
Maik Broemme2850cb42009-04-17 18:53:21 +0200109#define PR_O_ORGTO 0x80000000 /* insert x-original-to with destination address */
Willy Tarreau66aa61f2009-01-18 21:44:07 +0100110
111/* bits for proxy->options2 */
112#define PR_O2_SPLIC_REQ 0x00000001 /* transfer requests using linux kernel's splice() */
113#define PR_O2_SPLIC_RTR 0x00000002 /* transfer responses using linux kernel's splice() */
114#define PR_O2_SPLIC_AUT 0x00000004 /* automatically use linux kernel's splice() */
115#define PR_O2_SPLIC_ANY (PR_O2_SPLIC_REQ|PR_O2_SPLIC_RTR|PR_O2_SPLIC_AUT)
Willy Tarreau32a4ec02009-04-02 11:35:18 +0200116#define PR_O2_REQBUG_OK 0x00000008 /* let buggy requests pass through */
117#define PR_O2_RSPBUG_OK 0x00000010 /* let buggy responses pass through */
Willy Tarreauc9bd0cc2009-05-10 11:57:02 +0200118#define PR_O2_NOLOGNORM 0x00000020 /* don't log normal traffic, only errors and retries */
119#define PR_O2_LOGERRORS 0x00000040 /* log errors and retries at level LOG_ERR */
Willy Tarreau9ea05a72009-06-14 12:07:01 +0200120#define PR_O2_SMARTACC 0x00000080 /* don't immediately ACK request after accept */
Willy Tarreaud88edf22009-06-14 15:48:17 +0200121#define PR_O2_SMARTCON 0x00000100 /* don't immediately send empty ACK after connect */
Emeric Brun647caf12009-06-30 17:57:00 +0200122#define PR_O2_RDPC_PRST 0x00000200 /* Actvate rdp cookie analyser */
Emeric Brun3a058f32009-06-30 18:26:00 +0200123#define PR_O2_CLFLOG 0x00000400 /* log into clf format */
Krzysztof Piotr Oledzki213014e2009-09-27 15:50:02 +0200124#define PR_O2_LOGHCHKS 0x00000800 /* log health checks */
Willy Tarreauf27b5ea2009-10-03 22:01:18 +0200125#define PR_O2_INDEPSTR 0x00001000 /* independant streams, don't update rex on write */
Krzysztof Piotr Oledzkiaeebf9b2009-10-04 15:43:17 +0200126#define PR_O2_SOCKSTAT 0x00002000 /* collect & provide separate statistics for sockets */
Cyril Bontéb21570a2009-11-29 20:04:48 +0100127
128/* appsession */
129#define PR_O2_AS_REQL 0x00004000 /* learn the session id from the request */
130#define PR_O2_AS_PFX 0x00008000 /* match on the cookie prefix */
131
132/* Encoding of appsession cookie matching modes : 2 possible values => 1 bit */
133#define PR_O2_AS_M_PP 0x00000000 /* path-parameters mode (the default mode) */
134#define PR_O2_AS_M_QS 0x00010000 /* query-string mode */
135#define PR_O2_AS_M_ANY 0x00010000 /* mask covering all PR_O2_AS_M_* values */
Willy Tarreau31682232007-11-29 15:38:04 +0100136
Hervé COMMOWICK698ae002010-01-12 09:25:13 +0100137#define PR_O2_MYSQL_CHK 0x00020000 /* use MYSQL check for server health */
Willy Tarreau88d349d2010-01-25 12:15:43 +0100138#define PR_O2_USE_PXHDR 0x00040000 /* use Proxy-Connection for proxy requests */
Willy Tarreauef781042010-01-27 11:53:01 +0100139#define PR_O2_CHK_SNDST 0x00080000 /* send the state of each server along with HTTP health checks */
Emeric Brunb982a3d2010-01-04 15:45:53 +0100140/* end of proxy->options2 */
141
142/* bits for sticking rules */
143#define STK_IS_MATCH 0x00000001 /* match on request fetch */
144#define STK_IS_STORE 0x00000002 /* store on request fetch */
145#define STK_ON_RSP 0x00000004 /* store on response fetch */
Hervé COMMOWICK698ae002010-01-12 09:25:13 +0100146
Willy Tarreauf073a832009-03-01 23:21:47 +0100147struct error_snapshot {
148 struct timeval when; /* date of this event, (tv_sec == 0) means "never" */
149 unsigned int len; /* original length of the last invalid request/response */
150 unsigned int pos; /* position of the first invalid character */
151 unsigned int sid; /* ID of the faulty session */
152 struct server *srv; /* server associated with the error (or NULL) */
153 struct proxy *oe; /* other end = frontend or backend involved */
154 struct sockaddr_storage src; /* client's address */
155 char buf[BUFSIZE]; /* copy of the beginning of the message */
156};
157
Willy Tarreaubaaee002006-06-26 02:48:02 +0200158struct proxy {
159 struct listener *listen; /* the listen addresses and sockets */
160 struct in_addr mon_net, mon_mask; /* don't forward connections from this net (network order) FIXME: should support IPv6 */
161 int state; /* proxy state */
Willy Tarreau35d66b02007-01-02 00:28:21 +0100162 int options; /* PR_O_REDISP, PR_O_TRANSP, ... */
Willy Tarreau66aa61f2009-01-18 21:44:07 +0100163 int options2; /* PR_O2_* */
Willy Tarreauc1a21672009-08-16 22:37:44 +0200164 unsigned int fe_req_ana, be_req_ana; /* bitmap of common request protocol analysers for the frontend and backend */
Willy Tarreau4e5b8282009-08-16 22:57:50 +0200165 unsigned int fe_rsp_ana, be_rsp_ana; /* bitmap of common response protocol analysers for the frontend and backend */
Willy Tarreau35d66b02007-01-02 00:28:21 +0100166 int mode; /* mode = PR_MODE_TCP, PR_MODE_HTTP or PR_MODE_HEALTH */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200167 struct sockaddr_in dispatch_addr; /* the default address to connect to */
Willy Tarreau5fdfb912007-01-01 23:11:07 +0100168 union {
169 struct proxy *be; /* default backend, or NULL if none set */
170 char *name; /* default backend name during config parse */
171 } defbe;
Willy Tarreaueb0c6142007-05-07 00:53:22 +0200172 struct list acl; /* ACL declared on this proxy */
Krzysztof Piotr Oledzki59bb2182010-01-29 17:58:21 +0100173 struct list req_acl; /* request ACL: allow/deny/http-auth */
Willy Tarreau5c8e3e02007-05-07 00:58:25 +0200174 struct list block_cond; /* early blocking conditions (chained) */
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200175 struct list redirect_rules; /* content redirecting rules (chained) */
Willy Tarreau55ea7572007-06-17 19:56:27 +0200176 struct list switching_rules; /* content switching rules (chained) */
Willy Tarreau4de91492010-01-22 19:10:05 +0100177 struct list force_persist_rules; /* 'force-persist' rules (chained) */
Emeric Brunb982a3d2010-01-04 15:45:53 +0100178 struct list sticking_rules; /* content sticking rules (chained) */
179 struct list storersp_rules; /* content store response rules (chained) */
Willy Tarreaub6866442008-07-14 23:54:42 +0200180 struct { /* TCP request processing */
Willy Tarreauc7e961e2008-08-17 17:13:47 +0200181 unsigned int inspect_delay; /* inspection delay */
Willy Tarreaub6866442008-07-14 23:54:42 +0200182 struct list inspect_rules; /* inspection rules */
183 } tcp_req;
Willy Tarreaua9fb0832009-07-10 20:53:53 +0200184 int acl_requires; /* Elements required to satisfy all ACLs (ACL_USE_*) */
Krzysztof Piotr Oledzkic6df0662010-01-05 16:38:49 +0100185 struct server *srv, defsrv; /* known servers; default server configuration */
Willy Tarreaub625a082007-11-26 01:15:43 +0100186 int srv_act, srv_bck; /* # of servers eligible for LB (UP|!checked) AND (enabled+weight!=0) */
Willy Tarreau5b4c2b52009-10-03 11:21:53 +0200187 struct lbprm lbprm; /* load-balancing parameters */
Krzysztof Piotr Oledzki1acf2172008-05-29 23:03:34 +0200188 char *cookie_domain; /* domain used to insert the cookie */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200189 char *cookie_name; /* name of the cookie to look for */
190 int cookie_len; /* strlen(cookie_name), computed only once */
Emeric Brun647caf12009-06-30 17:57:00 +0200191 char *rdp_cookie_name; /* name of the RDP cookie to look for */
192 int rdp_cookie_len; /* strlen(rdp_cookie_name), computed only once */
Willy Tarreau01732802007-11-01 22:48:15 +0100193 char *url_param_name; /* name of the URL parameter used for hashing */
194 int url_param_len; /* strlen(url_param_name), computed only once */
matt.farnsworth@nokia.com1c2ab962008-04-14 20:47:37 +0200195 unsigned url_param_post_limit; /* if checking POST body for URI parameter, max body to wait for */
Marek Majkowski9c30fc12008-04-27 23:25:55 +0200196 int uri_len_limit; /* character limit for uri balancing algorithm */
197 int uri_dirs_depth1; /* directories+1 (slashes) limit for uri balancing algorithm */
Benoitaffb4812009-03-25 13:02:10 +0100198 char *hh_name; /* name of the header parameter used for hashing */
199 int hh_len; /* strlen(hh_name), computed only once */
200 int hh_match_domain; /* toggle use of special match function */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200201 char *appsession_name; /* name of the cookie to look for */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200202 int appsession_name_len; /* strlen(appsession_name), computed only once */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200203 int appsession_len; /* length of the appsession cookie value to be used */
Willy Tarreau51041c72007-09-09 21:56:53 +0200204 struct appsession_hash htbl_proxy; /* Per Proxy hashtable */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200205 char *capture_name; /* beginning of the name of the cookie to capture */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200206 int capture_namelen; /* length of the cookie name to match */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200207 int capture_len; /* length of the string to be captured */
208 struct uri_auth *uri_auth; /* if non-NULL, the (list of) per-URI authentications */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200209 char *monitor_uri; /* a special URI to which we respond with HTTP/200 OK */
210 int monitor_uri_len; /* length of the string above. 0 if unused */
Willy Tarreaub80c2302007-11-30 20:51:32 +0100211 struct list mon_fail_cond; /* list of conditions to fail monitoring requests (chained) */
Willy Tarreau3a70f942008-02-15 11:15:34 +0100212 struct { /* WARNING! check proxy_reset_timeouts() in proxy.h !!! */
Willy Tarreau0c303ee2008-07-07 00:09:58 +0200213 int client; /* client I/O timeout (in ticks) */
214 int tarpit; /* tarpit timeout, defaults to connect if unspecified */
215 int queue; /* queue timeout, defaults to connect if unspecified */
216 int connect; /* connect timeout (in ticks) */
217 int server; /* server I/O timeout (in ticks) */
218 int appsession; /* appsession cookie expiration */
219 int httpreq; /* maximum time for complete HTTP request */
Willy Tarreaub16a5742010-01-10 14:46:16 +0100220 int httpka; /* maximum time for a new HTTP request when using keep-alive */
Willy Tarreau0c303ee2008-07-07 00:09:58 +0200221 int check; /* maximum time for complete check */
Willy Tarreau1fa31262007-12-03 00:36:16 +0100222 } timeout;
Krzysztof Piotr Oledzki48cb2ae2009-10-02 22:51:14 +0200223 char *id, *desc; /* proxy id (name) and description */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200224 struct list pendconns; /* pending connections with no server assigned yet */
Willy Tarreauac68c5d2009-10-04 23:12:44 +0200225 int nbpend; /* number of pending connections with no server assigned yet */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200226 int totpend; /* total number of pending connections on this instance (for stats) */
Krzysztof Piotr Oledzki052d4fd2009-10-04 14:52:57 +0200227 unsigned int feconn, beconn; /* # of active frontend and backends sessions */
Willy Tarreaud9b587f2010-02-26 10:05:55 +0100228 struct freq_ctr fe_req_per_sec; /* HTTP requests per second on the frontend */
Willy Tarreau7f062c42009-03-05 18:43:00 +0100229 struct freq_ctr fe_sess_per_sec; /* sessions per second on the frontend */
230 struct freq_ctr be_sess_per_sec; /* sessions per second on the backend */
Willy Tarreau86034312006-12-29 00:10:33 +0100231 unsigned int maxconn; /* max # of active sessions on the frontend */
Willy Tarreau13a34bd2009-05-10 18:52:49 +0200232 unsigned int fe_sps_lim; /* limit on new sessions per second on the frontend */
Willy Tarreau86034312006-12-29 00:10:33 +0100233 unsigned int fullconn; /* #conns on backend above which servers are used at full load */
Willy Tarreau7ac51f62007-03-25 16:00:04 +0200234 struct in_addr except_net, except_mask; /* don't x-forward-for for this address. FIXME: should support IPv6 */
Maik Broemme2850cb42009-04-17 18:53:21 +0200235 struct in_addr except_to; /* don't x-original-to for this address. */
236 struct in_addr except_mask_to; /* the netmask for except_to. */
Ross Westaf72a1d2008-08-03 10:51:45 +0200237 char *fwdfor_hdr_name; /* header to use - default: "x-forwarded-for" */
238 int fwdfor_hdr_len; /* length of "x-forwarded-for" header */
Maik Broemme2850cb42009-04-17 18:53:21 +0200239 char *orgto_hdr_name; /* header to use - default: "x-original-to" */
240 int orgto_hdr_len; /* length of "x-original-to" header */
Krzysztof Oledzki85130942007-10-22 16:21:10 +0200241
242 unsigned down_trans; /* up-down transitions */
243 unsigned down_time; /* total time the proxy was down */
244 time_t last_change; /* last time, when the state was changed */
245
Willy Tarreaubaaee002006-06-26 02:48:02 +0200246 int conn_retries; /* maximum number of connect retries */
Willy Tarreau977b8e42006-12-29 14:19:17 +0100247 int cap; /* supported capabilities (PR_CAP_*) */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200248 struct sockaddr_in source_addr; /* the address to which we want to bind for connect() */
Willy Tarreau4864c352008-01-14 16:36:15 +0100249#if defined(CONFIG_HAP_CTTPROXY) || defined(CONFIG_HAP_LINUX_TPROXY)
Willy Tarreau77074d52006-11-12 23:57:19 +0100250 struct sockaddr_in tproxy_addr; /* non-local address we want to bind to for connect() */
251#endif
Willy Tarreaud53f96b2009-02-04 18:46:54 +0100252 int iface_len; /* bind interface name length */
253 char *iface_name; /* bind interface name or NULL */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200254 struct proxy *next;
Robert Tsai81ae1952007-12-05 10:47:29 +0100255 struct logsrv logsrv1, logsrv2; /* 2 syslog servers */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200256 signed char logfac1, logfac2; /* log facility for both servers. -1 = disabled */
257 int loglev1, loglev2; /* log level for each server, 7 by default */
Willy Tarreauf7edefa2009-05-10 17:20:05 +0200258 int minlvl1, minlvl2; /* minimum log level for each server, 0 by default */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200259 int to_log; /* things to be logged (LW_*) */
Willy Tarreau0c303ee2008-07-07 00:09:58 +0200260 int stop_time; /* date to stop listening, when stopping != 0 (int ticks) */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200261 struct hdr_exp *req_exp; /* regular expressions for request headers */
262 struct hdr_exp *rsp_exp; /* regular expressions for response headers */
263 int nb_req_cap, nb_rsp_cap; /* # of headers to be captured */
264 struct cap_hdr *req_cap; /* chained list of request headers to be captured */
265 struct cap_hdr *rsp_cap; /* chained list of response headers to be captured */
Willy Tarreaucf7f3202007-05-13 22:46:04 +0200266 struct pool_head *req_cap_pool, /* pools of pre-allocated char ** used to build the sessions */
267 *rsp_cap_pool;
Willy Tarreau1d4154a2007-05-13 22:57:02 +0200268 struct pool_head *hdr_idx_pool; /* pools of pre-allocated int* used for headers indexing */
Willy Tarreaudeb9ed82010-01-03 21:03:22 +0100269 struct list req_add, rsp_add; /* headers to be added */
Willy Tarreauac68c5d2009-10-04 23:12:44 +0200270 struct pxcounters counters; /* statistics counters */
Emeric Brunb982a3d2010-01-04 15:45:53 +0100271
272 struct stktable table; /* table for storing sticking sessions */
273
Willy Tarreaubaaee002006-06-26 02:48:02 +0200274 int grace; /* grace time after stop request */
Willy Tarreauf3c69202006-07-09 16:42:34 +0200275 char *check_req; /* HTTP or SSL request to use for PR_O_HTTP_CHK|PR_O_SSL3_CHK */
276 int check_len; /* Length of the HTTP or SSL3 request */
Willy Tarreau0f772532006-12-23 20:51:41 +0100277 struct chunk errmsg[HTTP_ERR_SIZE]; /* default or customized error messages for known errors */
Willy Tarreaudcd47712007-11-04 23:35:08 +0100278 int uuid; /* universally unique proxy ID, used for SNMP */
Willy Tarreauc73ce2b2008-01-06 10:55:10 +0100279 unsigned int backlog; /* force the frontend's listen backlog */
Willy Tarreau0b9c02c2009-02-04 22:05:05 +0100280 unsigned int bind_proc; /* bitmask of processes using this proxy. 0 = all. */
Willy Tarreauf073a832009-03-01 23:21:47 +0100281 struct error_snapshot invalid_req, invalid_rep; /* captures of last errors */
Willy Tarreau84b57da2009-06-14 11:10:45 +0200282
283 /* used only during configuration parsing */
284 int no_options; /* PR_O_REDISP, PR_O_TRANSP, ... */
285 int no_options2; /* PR_O2_* */
Krzysztof Piotr Oledzki052d4fd2009-10-04 14:52:57 +0200286
Willy Tarreau90a570f2009-10-04 20:54:54 +0200287 struct {
288 const char *file; /* file where the section appears */
289 int line; /* line where the section appears */
Willy Tarreau53fb4ae2009-10-04 23:04:08 +0200290 struct eb32_node id; /* place in the tree of used IDs */
291 struct eb_root used_listener_id;/* list of listener IDs in use */
292 struct eb_root used_server_id; /* list of server IDs in use */
Willy Tarreau90a570f2009-10-04 20:54:54 +0200293 } conf; /* config information */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200294};
295
Willy Tarreau55ea7572007-06-17 19:56:27 +0200296struct switching_rule {
297 struct list list; /* list linked to from the proxy */
298 struct acl_cond *cond; /* acl condition to meet */
299 union {
300 struct proxy *backend; /* target backend */
301 char *name; /* target backend name during config parsing */
302 } be;
303};
304
Willy Tarreau4de91492010-01-22 19:10:05 +0100305struct force_persist_rule {
306 struct list list; /* list linked to from the proxy */
307 struct acl_cond *cond; /* acl condition to meet */
308};
309
Emeric Brunb982a3d2010-01-04 15:45:53 +0100310struct sticking_rule {
311 struct list list; /* list linked to from the proxy */
312 struct acl_cond *cond; /* acl condition to meet */
313 struct pattern_expr *expr; /* fetch expr to fetch key */
314 int flags; /* STK_* */
315 union {
316 struct stktable *t; /* target table */
317 char *name; /* target table name during config parsing */
318 } table;
319};
320
321
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200322struct redirect_rule {
323 struct list list; /* list linked to from the proxy */
324 struct acl_cond *cond; /* acl condition to meet */
325 int type;
326 int rdr_len;
327 char *rdr_str;
328 int code;
Willy Tarreau79da4692008-11-19 20:03:04 +0100329 unsigned int flags;
Willy Tarreau0140f252008-11-19 21:07:09 +0100330 int cookie_len;
331 char *cookie_str;
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200332};
333
Willy Tarreaubaaee002006-06-26 02:48:02 +0200334extern struct proxy *proxy;
Willy Tarreau53fb4ae2009-10-04 23:04:08 +0200335extern struct eb_root used_proxy_id; /* list of proxy IDs in use */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200336
337#endif /* _TYPES_PROXY_H */
338
339/*
340 * Local variables:
341 * c-indent-level: 8
342 * c-basic-offset: 8
343 * End:
344 */