blob: 9b06955bf20e6b87672c09220b223a19b45d7a5a [file] [log] [blame]
Willy Tarreaubaaee002006-06-26 02:48:02 +02001/*
Willy Tarreau5b4c2b52009-10-03 11:21:53 +02002 * include/types/proxy.h
3 * This file defines everything related to proxies.
4 *
Willy Tarreauff011f22011-01-06 17:51:27 +01005 * Copyright (C) 2000-2011 Willy Tarreau - w@1wt.eu
Willy Tarreau5b4c2b52009-10-03 11:21:53 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
Willy Tarreaubaaee002006-06-26 02:48:02 +020021
22#ifndef _TYPES_PROXY_H
23#define _TYPES_PROXY_H
24
Willy Tarreau7d677682006-10-15 23:18:47 +020025#include <sys/types.h>
26#include <sys/socket.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020027#include <netinet/in.h>
28#include <arpa/inet.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020029
Willy Tarreauc7e42382012-08-24 19:22:53 +020030#include <common/chunk.h>
Willy Tarreaue3ba5f02006-06-29 18:54:54 +020031#include <common/config.h>
Willy Tarreau35b51c62018-09-10 15:38:55 +020032#include <common/http.h>
Willy Tarreau2dd0d472006-06-29 17:53:05 +020033#include <common/mini-clist.h>
34#include <common/regex.h>
Willy Tarreaua8cff1d2007-04-09 16:10:57 +020035#include <common/tools.h>
Christopher Fauletff8abcd2017-06-02 15:33:24 +020036#include <common/hathreads.h>
37
Willy Tarreau45cb4fb2009-10-26 21:10:04 +010038#include <eb32tree.h>
Willy Tarreauf79d9502014-03-15 07:22:35 +010039#include <ebistree.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020040
Willy Tarreaueb0c6142007-05-07 00:53:22 +020041#include <types/acl.h>
Willy Tarreau5b4c2b52009-10-03 11:21:53 +020042#include <types/backend.h>
Krzysztof Piotr Oledzki052d4fd2009-10-04 14:52:57 +020043#include <types/counters.h>
Christopher Fauletd7c91962015-04-30 11:48:27 +020044#include <types/filters.h>
Willy Tarreau7f062c42009-03-05 18:43:00 +010045#include <types/freq_ctr.h>
Willy Tarreaud1d54542012-09-12 22:58:11 +020046#include <types/listener.h>
Robert Tsai81ae1952007-12-05 10:47:29 +010047#include <types/log.h>
Willy Tarreau3fdb3662012-11-12 00:42:33 +010048#include <types/obj_type.h>
Willy Tarreaucd3b0942012-04-27 21:52:18 +020049#include <types/sample.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020050#include <types/server.h>
Emeric Brunb982a3d2010-01-04 15:45:53 +010051#include <types/stick_table.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020052
53/* values for proxy->state */
Willy Tarreau8379c172013-12-06 21:29:13 +010054enum pr_state {
Willy Tarreau562515c2011-07-25 08:11:52 +020055 PR_STNEW = 0, /* proxy has not been initialized yet */
56 PR_STREADY, /* proxy has been initialized and is ready */
57 PR_STFULL, /* frontend is full (maxconn reached) */
58 PR_STPAUSED, /* frontend is paused (during hot restart) */
59 PR_STSTOPPED, /* proxy is stopped (end of a restart) */
60 PR_STERROR, /* proxy experienced an unrecoverable error */
Willy Tarreau8379c172013-12-06 21:29:13 +010061} __attribute__((packed));
Willy Tarreaubaaee002006-06-26 02:48:02 +020062
63/* values for proxy->mode */
Willy Tarreau8379c172013-12-06 21:29:13 +010064enum pr_mode {
65 PR_MODE_TCP = 0,
66 PR_MODE_HTTP,
67 PR_MODE_HEALTH,
William Lallemandcf62f7e2018-10-26 14:47:40 +020068 PR_MODE_CLI,
Willy Tarreau8379c172013-12-06 21:29:13 +010069} __attribute__((packed));
Willy Tarreaubaaee002006-06-26 02:48:02 +020070
Baptiste Assmanne11cfcd2015-08-19 16:44:03 +020071enum PR_SRV_STATE_FILE {
72 PR_SRV_STATE_FILE_UNSPEC = 0,
73 PR_SRV_STATE_FILE_NONE,
74 PR_SRV_STATE_FILE_GLOBAL,
75 PR_SRV_STATE_FILE_LOCAL,
76};
77
78
Willy Tarreau977b8e42006-12-29 14:19:17 +010079/* flag values for proxy->cap. This is a bitmask of capabilities supported by the proxy */
80#define PR_CAP_NONE 0x0000
81#define PR_CAP_FE 0x0001
82#define PR_CAP_BE 0x0002
Christopher Faulet898566e2016-10-26 11:06:28 +020083#define PR_CAP_LISTEN (PR_CAP_FE|PR_CAP_BE)
Willy Tarreau977b8e42006-12-29 14:19:17 +010084
Willy Tarreau31682232007-11-29 15:38:04 +010085/* bits for proxy->options */
86#define PR_O_REDISP 0x00000001 /* allow reconnection to dispatch in case of errors */
87#define PR_O_TRANSP 0x00000002 /* transparent mode : use original DEST as dispatch */
Willy Tarreaud8fecee2015-08-05 14:12:31 +020088
89/* HTTP server-side reuse */
90#define PR_O_REUSE_NEVR 0x00000000 /* never reuse a shared connection */
91#define PR_O_REUSE_SAFE 0x00000004 /* only reuse a shared connection when it's safe to do so */
92#define PR_O_REUSE_AGGR 0x00000008 /* aggressively reuse a shared connection */
93#define PR_O_REUSE_ALWS 0x0000000C /* always reuse a shared connection */
94#define PR_O_REUSE_MASK 0x0000000C /* mask to retrieve shared connection preferences */
95
96/* unused: 0x10 */
Willy Tarreau9420b122013-12-15 18:58:25 +010097#define PR_O_PREF_LAST 0x00000020 /* prefer last server */
Willy Tarreau1620ec32011-08-06 17:05:02 +020098#define PR_O_DISPATCH 0x00000040 /* use dispatch mode */
Willy Tarreau0d1fdf72015-05-27 16:44:02 +020099#define PR_O_FORCED_ID 0x00000080 /* proxy's ID was forced in the configuration */
Willy Tarreau87cf5142011-08-19 22:57:24 +0200100#define PR_O_FWDFOR 0x00000100 /* conditionally insert x-forwarded-for with client address */
Willy Tarreau0f228a02015-05-01 15:37:53 +0200101#define PR_O_IGNORE_PRB 0x00000200 /* ignore empty requests (aborts and timeouts) */
Willy Tarreau31682232007-11-29 15:38:04 +0100102#define PR_O_NULLNOLOG 0x00000400 /* a connect without request will not be logged */
Willy Tarreau9fbe18e2015-05-01 22:42:08 +0200103#define PR_O_WREQ_BODY 0x00000800 /* always wait for the HTTP request body */
104/* unused: 0x1000 */
Willy Tarreau87cf5142011-08-19 22:57:24 +0200105#define PR_O_FF_ALWAYS 0x00002000 /* always set x-forwarded-for */
Willy Tarreau31682232007-11-29 15:38:04 +0100106#define PR_O_PERSIST 0x00004000 /* server persistence stays effective even when server is down */
Willy Tarreau87b09662015-04-03 00:22:06 +0200107#define PR_O_LOGASAP 0x00008000 /* log as soon as possible, without waiting for the stream to complete */
Willy Tarreau02bce8b2014-01-30 00:15:28 +0100108/* unused: 0x00010000 */
Willy Tarreau31682232007-11-29 15:38:04 +0100109#define PR_O_CHK_CACHE 0x00020000 /* require examination of cacheability of the 'set-cookie' field */
Willy Tarreau87b09662015-04-03 00:22:06 +0200110#define PR_O_TCP_CLI_KA 0x00040000 /* enable TCP keep-alive on client-side streams */
111#define PR_O_TCP_SRV_KA 0x00080000 /* enable TCP keep-alive on server-side streams */
Willy Tarreau31682232007-11-29 15:38:04 +0100112#define PR_O_USE_ALL_BK 0x00100000 /* load-balance between backup servers */
Willy Tarreau02bce8b2014-01-30 00:15:28 +0100113/* unused: 0x00020000 */
Willy Tarreau31682232007-11-29 15:38:04 +0100114#define PR_O_TCP_NOLING 0x00400000 /* disable lingering on client and server connections */
115#define PR_O_ABRT_CLOSE 0x00800000 /* immediately abort request when client closes */
Willy Tarreau31682232007-11-29 15:38:04 +0100116
Willy Tarreau70dffda2014-01-30 03:07:23 +0100117#define PR_O_HTTP_KAL 0x00000000 /* HTTP keep-alive mode (http-keep-alive) */
Christopher Faulet315b39c2018-09-21 16:26:19 +0200118#define PR_O_HTTP_CLO 0x01000000 /* HTTP close mode (httpclose) */
119#define PR_O_HTTP_SCL 0x02000000 /* HTTP server close mode (http-server-close) */
Willy Tarreau70dffda2014-01-30 03:07:23 +0100120#define PR_O_HTTP_TUN 0x04000000 /* HTTP tunnel mode : no analysis past first request/response */
Willy Tarreau02bce8b2014-01-30 00:15:28 +0100121#define PR_O_HTTP_MODE 0x07000000 /* MASK to retrieve the HTTP mode */
Christopher Faulet315b39c2018-09-21 16:26:19 +0200122
Baptiste Assmann69e273f2013-12-11 00:52:19 +0100123#define PR_O_TCPCHK_SSL 0x08000000 /* at least one TCPCHECK connect rule requires SSL */
Joseph Herlant59dd2952018-11-15 11:46:55 -0800124#define PR_O_CONTSTATS 0x10000000 /* continuous counters */
Willy Tarreau87b09662015-04-03 00:22:06 +0200125#define PR_O_HTTP_PROXY 0x20000000 /* Enable stream to use HTTP proxy operations */
Willy Tarreau48494c02007-11-30 10:41:39 +0100126#define PR_O_DISABLE404 0x40000000 /* Disable a server on a 404 response to a health-check */
Maik Broemme2850cb42009-04-17 18:53:21 +0200127#define PR_O_ORGTO 0x80000000 /* insert x-original-to with destination address */
Willy Tarreau66aa61f2009-01-18 21:44:07 +0100128
129/* bits for proxy->options2 */
130#define PR_O2_SPLIC_REQ 0x00000001 /* transfer requests using linux kernel's splice() */
131#define PR_O2_SPLIC_RTR 0x00000002 /* transfer responses using linux kernel's splice() */
132#define PR_O2_SPLIC_AUT 0x00000004 /* automatically use linux kernel's splice() */
133#define PR_O2_SPLIC_ANY (PR_O2_SPLIC_REQ|PR_O2_SPLIC_RTR|PR_O2_SPLIC_AUT)
Willy Tarreau32a4ec02009-04-02 11:35:18 +0200134#define PR_O2_REQBUG_OK 0x00000008 /* let buggy requests pass through */
135#define PR_O2_RSPBUG_OK 0x00000010 /* let buggy responses pass through */
Willy Tarreauc9bd0cc2009-05-10 11:57:02 +0200136#define PR_O2_NOLOGNORM 0x00000020 /* don't log normal traffic, only errors and retries */
137#define PR_O2_LOGERRORS 0x00000040 /* log errors and retries at level LOG_ERR */
Willy Tarreau9ea05a72009-06-14 12:07:01 +0200138#define PR_O2_SMARTACC 0x00000080 /* don't immediately ACK request after accept */
Willy Tarreaud88edf22009-06-14 15:48:17 +0200139#define PR_O2_SMARTCON 0x00000100 /* don't immediately send empty ACK after connect */
Emeric Brun647caf12009-06-30 17:57:00 +0200140#define PR_O2_RDPC_PRST 0x00000200 /* Actvate rdp cookie analyser */
Emeric Brun3a058f32009-06-30 18:26:00 +0200141#define PR_O2_CLFLOG 0x00000400 /* log into clf format */
Krzysztof Piotr Oledzki213014e2009-09-27 15:50:02 +0200142#define PR_O2_LOGHCHKS 0x00000800 /* log health checks */
Jamie Gloudon801a0a32012-08-25 00:18:33 -0400143#define PR_O2_INDEPSTR 0x00001000 /* independent streams, don't update rex on write */
Krzysztof Piotr Oledzkiaeebf9b2009-10-04 15:43:17 +0200144#define PR_O2_SOCKSTAT 0x00002000 /* collect & provide separate statistics for sockets */
Cyril Bontéb21570a2009-11-29 20:04:48 +0100145
Christopher Fauleta99ff4d2019-07-22 16:18:24 +0200146#define PR_O2_H1_ADJ_BUGCLI 0x00008000 /* adjust the case of h1 headers of the response for bogus clients */
147#define PR_O2_H1_ADJ_BUGSRV 0x00004000 /* adjust the case of h1 headers of the request for bogus servers */
148
149/* unused: 0x00010000 */
Cyril Bontéb21570a2009-11-29 20:04:48 +0100150
Willy Tarreau1620ec32011-08-06 17:05:02 +0200151#define PR_O2_NODELAY 0x00020000 /* fully interactive mode, never delay outgoing data */
Willy Tarreau88d349d2010-01-25 12:15:43 +0100152#define PR_O2_USE_PXHDR 0x00040000 /* use Proxy-Connection for proxy requests */
Willy Tarreauef781042010-01-27 11:53:01 +0100153#define PR_O2_CHK_SNDST 0x00080000 /* send the state of each server along with HTTP health checks */
William Lallemandb7ff6a32012-03-02 14:35:21 +0100154
155#define PR_O2_SRC_ADDR 0x00100000 /* get the source ip and port for logs */
156
Willy Tarreau8a8e1d92010-04-05 16:15:16 +0200157#define PR_O2_FAKE_KA 0x00200000 /* pretend we do keep-alive with server eventhough we close */
Willy Tarreau68ad3a42018-10-22 11:49:15 +0200158#define PR_O2_USE_HTX 0x00400000 /* use the HTX representation for the HTTP protocol */
Olivier Houcharda254a372019-04-05 15:30:12 +0200159
Willy Tarreaubd741542010-03-16 18:46:54 +0100160#define PR_O2_EXP_NONE 0x00000000 /* http-check : no expect rule */
161#define PR_O2_EXP_STS 0x00800000 /* http-check expect status */
162#define PR_O2_EXP_RSTS 0x01000000 /* http-check expect rstatus */
163#define PR_O2_EXP_STR 0x01800000 /* http-check expect string */
164#define PR_O2_EXP_RSTR 0x02000000 /* http-check expect rstring */
165#define PR_O2_EXP_TYPE 0x03800000 /* mask for http-check expect type */
166#define PR_O2_EXP_INV 0x04000000 /* http-check expect !<rule> */
Willy Tarreau67402132012-05-31 20:40:20 +0200167/* unused: 0x08000000 */
Rauf Kuliyev38b41562011-01-04 15:14:13 +0100168
Willy Tarreau1620ec32011-08-06 17:05:02 +0200169/* server health checks */
170#define PR_O2_CHK_NONE 0x00000000 /* no L7 health checks configured (TCP by default) */
Rauf Kuliyev38b41562011-01-04 15:14:13 +0100171#define PR_O2_PGSQL_CHK 0x10000000 /* use PGSQL check for server health */
Willy Tarreau1620ec32011-08-06 17:05:02 +0200172#define PR_O2_REDIS_CHK 0x20000000 /* use LDAP check for server health */
173#define PR_O2_SMTP_CHK 0x30000000 /* use SMTP EHLO check for server health - pvandijk@vision6.com.au */
174#define PR_O2_HTTP_CHK 0x40000000 /* use HTTP 'OPTIONS' method to check server health */
175#define PR_O2_MYSQL_CHK 0x50000000 /* use MYSQL check for server health */
176#define PR_O2_LDAP_CHK 0x60000000 /* use LDAP check for server health */
177#define PR_O2_SSL3_CHK 0x70000000 /* use SSLv3 CLIENT_HELLO packets for server health */
Simon Hormana2b9dad2013-02-12 10:45:54 +0900178#define PR_O2_LB_AGENT_CHK 0x80000000 /* use a TCP connection to obtain a metric of server health */
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200179#define PR_O2_TCPCHK_CHK 0x90000000 /* use TCPCHK check for server health */
Simon Horman98637e52014-06-20 12:30:16 +0900180#define PR_O2_EXT_CHK 0xA0000000 /* use external command for server health */
Christopher Fauletba7bc162016-11-07 21:07:38 +0100181#define PR_O2_SPOP_CHK 0xB0000000 /* use SPOP for server health */
182/* unused: 0xC0000000 to 0xF000000, reserved for health checks */
Willy Tarreau1620ec32011-08-06 17:05:02 +0200183#define PR_O2_CHK_ANY 0xF0000000 /* Mask to cover any check */
Emeric Brunb982a3d2010-01-04 15:45:53 +0100184/* end of proxy->options2 */
185
Willy Tarreau67402132012-05-31 20:40:20 +0200186/* Cookie settings for pr->ck_opts */
Willy Tarreaub5ba17e2012-05-31 20:43:11 +0200187#define PR_CK_RW 0x00000001 /* rewrite all direct cookies with the right serverid */
188#define PR_CK_IND 0x00000002 /* keep only indirect cookies */
189#define PR_CK_INS 0x00000004 /* insert cookies when not accessing a server directly */
190#define PR_CK_PFX 0x00000008 /* rewrite all cookies by prefixing the right serverid */
191#define PR_CK_ANY (PR_CK_RW | PR_CK_IND | PR_CK_INS | PR_CK_PFX)
192#define PR_CK_NOC 0x00000010 /* add a 'Cache-control' header with the cookie */
193#define PR_CK_POST 0x00000020 /* don't insert cookies for requests other than a POST */
194#define PR_CK_PSV 0x00000040 /* cookie ... preserve */
Willy Tarreau4992dd22012-05-31 21:02:17 +0200195#define PR_CK_HTTPONLY 0x00000080 /* emit the "HttpOnly" attribute */
196#define PR_CK_SECURE 0x00000100 /* emit the "Secure" attribute */
Olivier Houchard4e694042017-03-14 20:01:29 +0100197#define PR_CK_DYNAMIC 0x00000200 /* create dynamic cookies for each server */
Willy Tarreau67402132012-05-31 20:40:20 +0200198
Emeric Brunb982a3d2010-01-04 15:45:53 +0100199/* bits for sticking rules */
200#define STK_IS_MATCH 0x00000001 /* match on request fetch */
201#define STK_IS_STORE 0x00000002 /* store on request fetch */
202#define STK_ON_RSP 0x00000004 /* store on response fetch */
Hervé COMMOWICK698ae002010-01-12 09:25:13 +0100203
Baptiste Assmann8a027cc2015-07-03 11:03:33 +0200204/* diff bits for proxy_find_best_match */
205#define PR_FBM_MISMATCH_ID 0x01
206#define PR_FBM_MISMATCH_NAME 0x02
207#define PR_FBM_MISMATCH_PROXYTYPE 0x04
208
Olivier Houcharda254a372019-04-05 15:30:12 +0200209/* Bits for the different retry causes */
210#define PR_RE_CONN_FAILED 0x00000001 /* Retry if we failed to connect */
211#define PR_RE_DISCONNECTED 0x00000002 /* Retry if we got disconnected with no answer */
212#define PR_RE_TIMEOUT 0x00000004 /* Retry if we got a server timeout before we got any data */
213#define PR_RE_404 0x00000008 /* Retry if we got a 404 */
214#define PR_RE_408 0x00000010 /* Retry if we got a 408 */
215#define PR_RE_425 0x00000020 /* Retry if we got a 425 */
216#define PR_RE_500 0x00000040 /* Retry if we got a 500 */
217#define PR_RE_501 0x00000080 /* Retry if we got a 501 */
218#define PR_RE_502 0x00000100 /* Retry if we got a 502 */
219#define PR_RE_503 0x00000200 /* Retry if we got a 503 */
220#define PR_RE_504 0x00000400 /* Retry if we got a 504 */
221#define PR_RE_STATUS_MASK (PR_RE_404 | PR_RE_408 | PR_RE_425 | \
222 PR_RE_425 | PR_RE_500 | PR_RE_501 | \
223 PR_RE_502 | PR_RE_503 | PR_RE_504)
Olivier Houchard865d8392019-05-03 22:46:27 +0200224/* 0x00000800, 0x00001000, 0x00002000, 0x00004000 and 0x00008000 unused,
225 * reserved for eventual future status codes
226 */
227#define PR_RE_EARLY_ERROR 0x00010000 /* Retry if we failed at sending early data */
Olivier Houcharde3249a92019-05-03 23:01:47 +0200228#define PR_RE_JUNK_REQUEST 0x00020000 /* We received an incomplete or garbage response */
Willy Tarreau87b09662015-04-03 00:22:06 +0200229struct stream;
Thierry FOURNIERac836ba2014-12-16 15:41:18 +0100230
Willy Tarreau7480f322018-09-06 19:41:22 +0200231struct http_snapshot {
Willy Tarreau87b09662015-04-03 00:22:06 +0200232 unsigned int sid; /* ID of the faulty stream */
Willy Tarreau078272e2010-12-12 12:46:33 +0100233 unsigned int state; /* message state before the error (when saved) */
Willy Tarreaud04b1bc2012-05-08 11:03:10 +0200234 unsigned int b_flags; /* buffer flags */
Willy Tarreau87b09662015-04-03 00:22:06 +0200235 unsigned int s_flags; /* stream flags */
Willy Tarreau7480f322018-09-06 19:41:22 +0200236
Willy Tarreaud04b1bc2012-05-08 11:03:10 +0200237 unsigned int t_flags; /* transaction flags */
238 unsigned int m_flags; /* message flags */
Willy Tarreaud04b1bc2012-05-08 11:03:10 +0200239 unsigned long long m_clen; /* chunk len for this message */
240 unsigned long long m_blen; /* body len for this message */
Willy Tarreau7480f322018-09-06 19:41:22 +0200241};
242
Christopher Faulete44769b2018-11-29 23:01:45 +0100243struct h1_snapshot {
244 unsigned int state; /* H1 message state when the error occurred */
245 unsigned int c_flags; /* H1 connection flags */
246 unsigned int s_flags; /* H1 stream flags */
247 unsigned int m_flags; /* H1 message flags */
248 unsigned long long m_clen; /* chunk len for this message */
249 unsigned long long m_blen; /* body len for this message */
250};
251
Willy Tarreau7480f322018-09-06 19:41:22 +0200252union error_snapshot_ctx {
253 struct http_snapshot http;
Christopher Faulete44769b2018-11-29 23:01:45 +0100254 struct h1_snapshot h1;
Willy Tarreau7480f322018-09-06 19:41:22 +0200255};
256
257struct error_snapshot {
258 /**** common part ****/
259 struct timeval when; /* date of this event, (tv_sec == 0) means "never" */
260 /* @16 */
Willy Tarreau4bc7d902018-09-07 20:07:17 +0200261 void (*show)(struct buffer *, const struct error_snapshot *); /* dump function */
Willy Tarreau7480f322018-09-06 19:41:22 +0200262 unsigned long long buf_ofs; /* relative position of the buffer's input inside its container */
263 /* @32 */
264 unsigned int buf_out; /* pending output bytes _before_ the buffer's input (0..buf->data-1) */
265 unsigned int buf_len; /* original length of the last invalid request/response (0..buf->data-1-buf_out) */
266 unsigned int buf_err; /* buffer-relative position where the error was detected (0..len-1) */
267 unsigned int buf_wrap; /* buffer-relative position where the buffer is expected to wrap (1..buf_size) */
268 /* @48 */
269 struct proxy *oe; /* other end = frontend or backend involved */
270 struct server *srv; /* server associated with the error (or NULL) */
271 /* @64 */
272 unsigned int ev_id; /* event number (counter incremented for each capture) */
273 /* @68: 4 bytes hole here */
274 struct sockaddr_storage src; /* client's address */
275
276 /**** protocol-specific part ****/
277 union error_snapshot_ctx ctx;
Willy Tarreau4bc7d902018-09-07 20:07:17 +0200278 char buf[0]; /* copy of the beginning of the message for bufsize bytes */
Willy Tarreauf073a832009-03-01 23:21:47 +0100279};
280
Simon Horman0ba0e4a2015-01-30 11:23:00 +0900281struct email_alert {
282 struct list list;
283 struct list tcpcheck_rules;
Christopher Faulet0108bb32017-10-20 21:34:32 +0200284 struct server *srv;
Simon Horman0ba0e4a2015-01-30 11:23:00 +0900285};
286
287struct email_alertq {
288 struct list email_alerts;
289 struct check check; /* Email alerts are implemented using existing check
290 * code even though they are not checks. This structure
291 * is as a parameter to the check code.
292 * Each check corresponds to a mailer */
Christopher Faulet9dcf9b62017-11-13 10:34:01 +0100293 __decl_hathreads(HA_SPINLOCK_T lock);
Simon Horman0ba0e4a2015-01-30 11:23:00 +0900294};
295
Willy Tarreaubaaee002006-06-26 02:48:02 +0200296struct proxy {
Willy Tarreau3fdb3662012-11-12 00:42:33 +0100297 enum obj_type obj_type; /* object type == OBJ_TYPE_PROXY */
Willy Tarreau8379c172013-12-06 21:29:13 +0100298 enum pr_state state; /* proxy state, one of PR_* */
299 enum pr_mode mode; /* mode = PR_MODE_TCP, PR_MODE_HTTP or PR_MODE_HEALTH */
300 char cap; /* supported capabilities (PR_CAP_*) */
Willy Tarreau87b09662015-04-03 00:22:06 +0200301 unsigned int maxconn; /* max # of active streams on the frontend */
Willy Tarreau8379c172013-12-06 21:29:13 +0100302
Willy Tarreau35d66b02007-01-02 00:28:21 +0100303 int options; /* PR_O_REDISP, PR_O_TRANSP, ... */
Willy Tarreau66aa61f2009-01-18 21:44:07 +0100304 int options2; /* PR_O2_* */
Olivier Houcharda4d4fdf2018-12-14 19:27:06 +0100305 int max_out_conns; /* Max number of idling connections we keep for a session */
Willy Tarreau3fdb3662012-11-12 00:42:33 +0100306 struct in_addr mon_net, mon_mask; /* don't forward connections from this net (network order) FIXME: should support IPv6 */
Willy Tarreau67402132012-05-31 20:40:20 +0200307 unsigned int ck_opts; /* PR_CK_* (cookie options) */
Willy Tarreauc1a21672009-08-16 22:37:44 +0200308 unsigned int fe_req_ana, be_req_ana; /* bitmap of common request protocol analysers for the frontend and backend */
Willy Tarreau4e5b8282009-08-16 22:57:50 +0200309 unsigned int fe_rsp_ana, be_rsp_ana; /* bitmap of common response protocol analysers for the frontend and backend */
Willy Tarreau25320b22013-03-24 07:22:08 +0100310 unsigned int http_needed; /* non-null if HTTP analyser may be used */
Willy Tarreau5fdfb912007-01-01 23:11:07 +0100311 union {
312 struct proxy *be; /* default backend, or NULL if none set */
313 char *name; /* default backend name during config parse */
314 } defbe;
Willy Tarreaueb0c6142007-05-07 00:53:22 +0200315 struct list acl; /* ACL declared on this proxy */
Willy Tarreaue365c0b2013-06-11 16:06:12 +0200316 struct list http_req_rules; /* HTTP request rules: allow/deny/... */
317 struct list http_res_rules; /* HTTP response rules: allow/deny/... */
Willy Tarreau353bc9f2014-04-28 22:05:31 +0200318 struct list block_rules; /* http-request block rules to be inserted before other ones */
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200319 struct list redirect_rules; /* content redirecting rules (chained) */
Willy Tarreau55ea7572007-06-17 19:56:27 +0200320 struct list switching_rules; /* content switching rules (chained) */
Cyril Bonté47fdd8e2010-04-25 00:00:51 +0200321 struct list persist_rules; /* 'force-persist' and 'ignore-persist' rules (chained) */
Emeric Brunb982a3d2010-01-04 15:45:53 +0100322 struct list sticking_rules; /* content sticking rules (chained) */
323 struct list storersp_rules; /* content store response rules (chained) */
Willy Tarreau4a5cade2012-04-05 21:09:48 +0200324 struct list server_rules; /* server switching rules (chained) */
Willy Tarreaub6866442008-07-14 23:54:42 +0200325 struct { /* TCP request processing */
Willy Tarreauc7e961e2008-08-17 17:13:47 +0200326 unsigned int inspect_delay; /* inspection delay */
Willy Tarreaub6866442008-07-14 23:54:42 +0200327 struct list inspect_rules; /* inspection rules */
Willy Tarreauab786192010-05-23 22:39:25 +0200328 struct list l4_rules; /* layer4 rules */
Willy Tarreau620408f2016-10-21 16:37:51 +0200329 struct list l5_rules; /* layer5 rules */
Willy Tarreaub6866442008-07-14 23:54:42 +0200330 } tcp_req;
Emeric Brun97679e72010-09-23 17:56:44 +0200331 struct { /* TCP request processing */
332 unsigned int inspect_delay; /* inspection delay */
333 struct list inspect_rules; /* inspection rules */
334 } tcp_rep;
Krzysztof Piotr Oledzkic6df0662010-01-05 16:38:49 +0100335 struct server *srv, defsrv; /* known servers; default server configuration */
Willy Tarreaua5110842017-11-26 08:41:31 +0100336 struct lbprm lbprm; /* load-balancing parameters */
Willy Tarreaub625a082007-11-26 01:15:43 +0100337 int srv_act, srv_bck; /* # of servers eligible for LB (UP|!checked) AND (enabled+weight!=0) */
Andrew Rodlande168feb2016-10-25 12:48:17 -0400338 int served; /* # of active sessions currently being served */
Willy Tarreaua5110842017-11-26 08:41:31 +0100339 int cookie_len; /* strlen(cookie_name), computed only once */
Krzysztof Piotr Oledzki1acf2172008-05-29 23:03:34 +0200340 char *cookie_domain; /* domain used to insert the cookie */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200341 char *cookie_name; /* name of the cookie to look for */
Christopher Fauletdb2cdbb2020-01-21 11:06:48 +0100342 char *cookie_attrs; /* list of attributes to add to the cookie */
Olivier Houchard4e694042017-03-14 20:01:29 +0100343 char *dyncookie_key; /* Secret key used to generate dynamic persistent cookies */
Willy Tarreau31936852010-10-06 16:59:56 +0200344 unsigned int cookie_maxidle; /* max idle time for this cookie */
345 unsigned int cookie_maxlife; /* max life time for this cookie */
Willy Tarreau4edd6832014-08-28 14:36:36 +0200346 char *rdp_cookie_name; /* name of the RDP cookie to look for */
Willy Tarreaua5110842017-11-26 08:41:31 +0100347 int rdp_cookie_len; /* strlen(rdp_cookie_name), computed only once */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200348 char *capture_name; /* beginning of the name of the cookie to capture */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200349 int capture_namelen; /* length of the cookie name to match */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200350 int capture_len; /* length of the string to be captured */
351 struct uri_auth *uri_auth; /* if non-NULL, the (list of) per-URI authentications */
Willy Tarreau4edd6832014-08-28 14:36:36 +0200352 int max_ka_queue; /* 1+maximum requests in queue accepted for reusing a K-A conn (0=none) */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200353 int monitor_uri_len; /* length of the string above. 0 if unused */
Willy Tarreau4edd6832014-08-28 14:36:36 +0200354 char *monitor_uri; /* a special URI to which we respond with HTTP/200 OK */
Willy Tarreaub80c2302007-11-30 20:51:32 +0100355 struct list mon_fail_cond; /* list of conditions to fail monitoring requests (chained) */
Willy Tarreau3a70f942008-02-15 11:15:34 +0100356 struct { /* WARNING! check proxy_reset_timeouts() in proxy.h !!! */
Willy Tarreau0c303ee2008-07-07 00:09:58 +0200357 int client; /* client I/O timeout (in ticks) */
358 int tarpit; /* tarpit timeout, defaults to connect if unspecified */
359 int queue; /* queue timeout, defaults to connect if unspecified */
360 int connect; /* connect timeout (in ticks) */
361 int server; /* server I/O timeout (in ticks) */
Willy Tarreau0c303ee2008-07-07 00:09:58 +0200362 int httpreq; /* maximum time for complete HTTP request */
Willy Tarreaub16a5742010-01-10 14:46:16 +0100363 int httpka; /* maximum time for a new HTTP request when using keep-alive */
Willy Tarreau0c303ee2008-07-07 00:09:58 +0200364 int check; /* maximum time for complete check */
Willy Tarreauce887fd2012-05-12 12:50:00 +0200365 int tunnel; /* I/O timeout to use in tunnel mode (in ticks) */
Willy Tarreau05cdd962014-05-10 14:30:07 +0200366 int clientfin; /* timeout to apply to client half-closed connections */
367 int serverfin; /* timeout to apply to server half-closed connections */
Willy Tarreau1fa31262007-12-03 00:36:16 +0100368 } timeout;
Krzysztof Piotr Oledzki48cb2ae2009-10-02 22:51:14 +0200369 char *id, *desc; /* proxy id (name) and description */
Patrick Hemmer0355dab2018-05-11 12:52:31 -0400370 struct eb_root pendconns; /* pending connections with no server assigned yet */
Willy Tarreauac68c5d2009-10-04 23:12:44 +0200371 int nbpend; /* number of pending connections with no server assigned yet */
Willy Tarreau1c47f852006-07-09 08:22:27 +0200372 int totpend; /* total number of pending connections on this instance (for stats) */
Patrick Hemmerda282f42018-05-11 12:52:31 -0400373 unsigned int queue_idx; /* number of pending connections which have been de-queued */
Willy Tarreau87b09662015-04-03 00:22:06 +0200374 unsigned int feconn, beconn; /* # of active frontend and backends streams */
Willy Tarreaud9b587f2010-02-26 10:05:55 +0100375 struct freq_ctr fe_req_per_sec; /* HTTP requests per second on the frontend */
Willy Tarreaub36b4242010-06-04 20:59:39 +0200376 struct freq_ctr fe_conn_per_sec; /* received connections per second on the frontend */
377 struct freq_ctr fe_sess_per_sec; /* accepted sessions per second on the frontend (after tcp rules) */
Willy Tarreau7f062c42009-03-05 18:43:00 +0100378 struct freq_ctr be_sess_per_sec; /* sessions per second on the backend */
Willy Tarreau13a34bd2009-05-10 18:52:49 +0200379 unsigned int fe_sps_lim; /* limit on new sessions per second on the frontend */
Willy Tarreau86034312006-12-29 00:10:33 +0100380 unsigned int fullconn; /* #conns on backend above which servers are used at full load */
Emeric Brun3f783572017-01-12 11:21:28 +0100381 unsigned int tot_fe_maxconn; /* #maxconn of frontends linked to that backend, it is used to compute fullconn */
Willy Tarreau7ac51f62007-03-25 16:00:04 +0200382 struct in_addr except_net, except_mask; /* don't x-forward-for for this address. FIXME: should support IPv6 */
Maik Broemme2850cb42009-04-17 18:53:21 +0200383 struct in_addr except_to; /* don't x-original-to for this address. */
384 struct in_addr except_mask_to; /* the netmask for except_to. */
Ross Westaf72a1d2008-08-03 10:51:45 +0200385 char *fwdfor_hdr_name; /* header to use - default: "x-forwarded-for" */
Maik Broemme2850cb42009-04-17 18:53:21 +0200386 char *orgto_hdr_name; /* header to use - default: "x-original-to" */
Willy Tarreau4edd6832014-08-28 14:36:36 +0200387 int fwdfor_hdr_len; /* length of "x-forwarded-for" header */
Maik Broemme2850cb42009-04-17 18:53:21 +0200388 int orgto_hdr_len; /* length of "x-original-to" header */
Mark Lamourinec2247f02012-01-04 13:02:01 -0500389 char *server_id_hdr_name; /* the header to use to send the server id (name) */
390 int server_id_hdr_len; /* the length of the id (name) header... name */
Willy Tarreau4edd6832014-08-28 14:36:36 +0200391 int conn_retries; /* maximum number of connect retries */
Olivier Houcharda254a372019-04-05 15:30:12 +0200392 unsigned int retry_type; /* Type of retry allowed */
Joseph Lynch726ab712015-05-11 23:25:34 -0700393 int redispatch_after; /* number of retries before redispatch */
Krzysztof Oledzki85130942007-10-22 16:21:10 +0200394 unsigned down_trans; /* up-down transitions */
395 unsigned down_time; /* total time the proxy was down */
Willy Tarreaua5110842017-11-26 08:41:31 +0100396 unsigned int log_count; /* number of logs produced by the frontend */
Krzysztof Oledzki85130942007-10-22 16:21:10 +0200397 time_t last_change; /* last time, when the state was changed */
Willy Tarreau87b09662015-04-03 00:22:06 +0200398 int (*accept)(struct stream *s); /* application layer's accept() */
Willy Tarreauef9a3602012-12-08 22:29:20 +0100399 struct conn_src conn_src; /* connection source settings */
Willy Tarreau87b09662015-04-03 00:22:06 +0200400 enum obj_type *default_target; /* default target to use for accepted streams or NULL */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200401 struct proxy *next;
Frédéric Lécaille015e4d72019-03-19 14:55:01 +0100402 struct proxy *next_stkt_ref; /* Link to the list of proxies which refer to the same stick-table. */
Willy Tarreau7346acb2014-08-28 15:03:15 +0200403
William Lallemand0f99e342011-10-12 17:50:54 +0200404 struct list logsrvs;
William Lallemand723b73a2012-02-08 16:37:49 +0100405 struct list logformat; /* log_format linked list */
Dragan Dosen0b85ece2015-09-25 19:17:44 +0200406 struct list logformat_sd; /* log_format linked list for the RFC5424 structured-data part */
Willy Tarreau83061a82018-07-13 11:56:34 +0200407 struct buffer log_tag; /* override default syslog tag */
William Lallemanda73203e2012-03-12 12:48:57 +0100408 char *header_unique_id; /* unique-id header */
409 struct list format_unique_id; /* unique-id format */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200410 int to_log; /* things to be logged (LW_*) */
Willy Tarreau0c303ee2008-07-07 00:09:58 +0200411 int stop_time; /* date to stop listening, when stopping != 0 (int ticks) */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200412 struct hdr_exp *req_exp; /* regular expressions for request headers */
413 struct hdr_exp *rsp_exp; /* regular expressions for response headers */
414 int nb_req_cap, nb_rsp_cap; /* # of headers to be captured */
415 struct cap_hdr *req_cap; /* chained list of request headers to be captured */
416 struct cap_hdr *rsp_cap; /* chained list of response headers to be captured */
Willy Tarreau87b09662015-04-03 00:22:06 +0200417 struct pool_head *req_cap_pool, /* pools of pre-allocated char ** used to build the streams */
Willy Tarreaucf7f3202007-05-13 22:46:04 +0200418 *rsp_cap_pool;
Willy Tarreaudeb9ed82010-01-03 21:03:22 +0100419 struct list req_add, rsp_add; /* headers to be added */
Willy Tarreauae9bea02016-11-25 14:44:52 +0100420 struct be_counters be_counters; /* backend statistics counters */
421 struct fe_counters fe_counters; /* frontend statistics counters */
Emeric Brunb982a3d2010-01-04 15:45:53 +0100422
Willy Tarreau07687c12011-07-24 23:55:06 +0200423 struct list listener_queue; /* list of the temporarily limited listeners because of lack of a proxy resource */
Frédéric Lécaille1b8e68e2019-03-14 07:07:41 +0100424 struct stktable *table; /* table for storing sticking streams */
Emeric Brunb982a3d2010-01-04 15:45:53 +0100425
Willy Tarreaud1a33e32012-10-04 00:14:33 +0200426 struct task *task; /* the associated task, mandatory to manage rate limiting, stopping and resource shortage, NULL if disabled */
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200427 struct list tcpcheck_rules; /* tcp-check send / expect rules */
Willy Tarreau4edd6832014-08-28 14:36:36 +0200428 int grace; /* grace time after stop request */
Willy Tarreauf3c69202006-07-09 16:42:34 +0200429 int check_len; /* Length of the HTTP or SSL3 request */
Willy Tarreau4edd6832014-08-28 14:36:36 +0200430 char *check_req; /* HTTP or SSL request to use for PR_O_HTTP_CHK|PR_O_SSL3_CHK */
Simon Horman98637e52014-06-20 12:30:16 +0900431 char *check_command; /* Command to use for external agent checks */
432 char *check_path; /* PATH environment to use for external agent checks */
Willy Tarreau1ee51a62011-08-19 20:04:17 +0200433 char *expect_str; /* http-check expected content : string or text version of the regex */
Thierry FOURNIER09af0d62014-06-18 11:35:54 +0200434 struct my_regex *expect_regex; /* http-check expected content */
Willy Tarreau83061a82018-07-13 11:56:34 +0200435 struct buffer errmsg[HTTP_ERR_SIZE]; /* default or customized error messages for known errors */
Willy Tarreaudcd47712007-11-04 23:35:08 +0100436 int uuid; /* universally unique proxy ID, used for SNMP */
Willy Tarreauc73ce2b2008-01-06 10:55:10 +0100437 unsigned int backlog; /* force the frontend's listen backlog */
Willy Tarreaua9db57e2013-01-18 11:29:29 +0100438 unsigned long bind_proc; /* bitmask of processes using this proxy */
Willy Tarreau7b815632011-10-21 18:51:57 +0200439
440 /* warning: these structs are huge, keep them at the bottom */
441 struct sockaddr_storage dispatch_addr; /* the default address to connect to */
Willy Tarreauc55015e2018-09-07 19:02:32 +0200442 struct error_snapshot *invalid_req, *invalid_rep; /* captures of last errors */
Willy Tarreau84b57da2009-06-14 11:10:45 +0200443
444 /* used only during configuration parsing */
445 int no_options; /* PR_O_REDISP, PR_O_TRANSP, ... */
446 int no_options2; /* PR_O2_* */
Krzysztof Piotr Oledzki052d4fd2009-10-04 14:52:57 +0200447
Willy Tarreau90a570f2009-10-04 20:54:54 +0200448 struct {
Willy Tarreau8113a5d2012-10-04 08:01:43 +0200449 char *file; /* file where the section appears */
Willy Tarreau53fb4ae2009-10-04 23:04:08 +0200450 struct eb32_node id; /* place in the tree of used IDs */
Willy Tarreaua5110842017-11-26 08:41:31 +0100451 int line; /* line where the section appears */
Willy Tarreau53fb4ae2009-10-04 23:04:08 +0200452 struct eb_root used_listener_id;/* list of listener IDs in use */
453 struct eb_root used_server_id; /* list of server IDs in use */
Frédéric Lécaille84d60462019-05-17 14:29:15 +0200454 struct eb_root used_server_name; /* list of server names in use */
Willy Tarreau2a65ff02012-09-13 17:54:29 +0200455 struct list bind; /* list of bind settings */
Willy Tarreau4348fad2012-09-20 16:48:07 +0200456 struct list listeners; /* list of listeners belonging to this frontend */
Willy Tarreaua4312fa2013-04-02 16:34:32 +0200457 struct arg_list args; /* sample arg list that need to be resolved */
Willy Tarreauf79d9502014-03-15 07:22:35 +0100458 struct ebpt_node by_name; /* proxies are stored sorted by name here */
Willy Tarreau62a61232013-04-12 18:13:46 +0200459 char *logformat_string; /* log format string */
460 char *lfs_file; /* file name where the logformat string appears (strdup) */
461 int lfs_line; /* file name where the logformat string appears */
Willy Tarreau62a61232013-04-12 18:13:46 +0200462 int uif_line; /* file name where the unique-id-format string appears */
Willy Tarreau4edd6832014-08-28 14:36:36 +0200463 char *uif_file; /* file name where the unique-id-format string appears (strdup) */
464 char *uniqueid_format_string; /* unique-id format string */
Dragan Dosen0b85ece2015-09-25 19:17:44 +0200465 char *logformat_sd_string; /* log format string for the RFC5424 structured-data part */
466 char *lfsd_file; /* file name where the structured-data logformat string for RFC5424 appears (strdup) */
467 int lfsd_line; /* file name where the structured-data logformat string for RFC5424 appears */
Willy Tarreau90a570f2009-10-04 20:54:54 +0200468 } conf; /* config information */
Willy Tarreau258a14b2010-07-13 16:24:48 +0200469 void *parent; /* parent of the proxy when applicable */
William Lallemand82fe75c2012-10-23 10:25:10 +0200470 struct comp *comp; /* http compression */
Simon Horman9dc49962015-01-30 11:22:59 +0900471
472 struct {
473 union {
474 struct mailers *m; /* Mailer to send email alerts via */
475 char *name;
476 } mailers;
Simon Horman0ba0e4a2015-01-30 11:23:00 +0900477 char *from; /* Address to send email alerts from */
478 char *to; /* Address(es) to send email alerts to */
Simon Horman9dc49962015-01-30 11:22:59 +0900479 char *myhostname; /* Identity to use in HELO command sent to mailer */
Simon Horman64e34162015-02-06 11:11:57 +0900480 int level; /* Maximum syslog level of messages to send
481 * email alerts for */
482 int set; /* True if email_alert settings are present */
Simon Horman0ba0e4a2015-01-30 11:23:00 +0900483 struct email_alertq *queues; /* per-mailer alerts queues */
Simon Horman9dc49962015-01-30 11:22:59 +0900484 } email_alert;
Baptiste Assmanne11cfcd2015-08-19 16:44:03 +0200485
486 int load_server_state_from_file; /* location of the file containing server state.
487 * flag PR_SRV_STATE_FILE_* */
488 char *server_state_file_name; /* used when load_server_state_from_file is set to
489 * PR_SRV_STATE_FILE_LOCAL. Give a specific file name for
490 * this backend. If not specified or void, then the backend
491 * name is used
492 */
Christopher Faulet443ea1a2016-02-04 13:40:26 +0100493 struct list filter_configs; /* list of the filters that are declared on this proxy */
Willy Tarreau0ff395c2019-07-30 11:59:34 +0200494 __decl_hathreads(HA_SPINLOCK_T lock); /* may be taken under the server's lock */
Willy Tarreaubaaee002006-06-26 02:48:02 +0200495};
496
Willy Tarreau55ea7572007-06-17 19:56:27 +0200497struct switching_rule {
498 struct list list; /* list linked to from the proxy */
499 struct acl_cond *cond; /* acl condition to meet */
Bertrand Jacquin702d44f2013-11-19 11:43:06 +0100500 int dynamic; /* this is a dynamic rule using the logformat expression */
Willy Tarreau55ea7572007-06-17 19:56:27 +0200501 union {
502 struct proxy *backend; /* target backend */
503 char *name; /* target backend name during config parsing */
Bertrand Jacquin702d44f2013-11-19 11:43:06 +0100504 struct list expr; /* logformat expression to use for dynamic rules */
Willy Tarreau55ea7572007-06-17 19:56:27 +0200505 } be;
Thierry FOURNIER / OZON.IO4ed1c952016-11-24 23:57:54 +0100506 char *file;
507 int line;
Willy Tarreau55ea7572007-06-17 19:56:27 +0200508};
509
Willy Tarreau4a5cade2012-04-05 21:09:48 +0200510struct server_rule {
511 struct list list; /* list linked to from the proxy */
512 struct acl_cond *cond; /* acl condition to meet */
513 union {
514 struct server *ptr; /* target server */
515 char *name; /* target server name during config parsing */
516 } srv;
517};
518
Cyril Bonté47fdd8e2010-04-25 00:00:51 +0200519struct persist_rule {
Willy Tarreau4de91492010-01-22 19:10:05 +0100520 struct list list; /* list linked to from the proxy */
521 struct acl_cond *cond; /* acl condition to meet */
Cyril Bonté47fdd8e2010-04-25 00:00:51 +0200522 int type;
Willy Tarreau4de91492010-01-22 19:10:05 +0100523};
524
Emeric Brunb982a3d2010-01-04 15:45:53 +0100525struct sticking_rule {
526 struct list list; /* list linked to from the proxy */
527 struct acl_cond *cond; /* acl condition to meet */
Willy Tarreau12785782012-04-27 21:37:17 +0200528 struct sample_expr *expr; /* fetch expr to fetch key */
Emeric Brunb982a3d2010-01-04 15:45:53 +0100529 int flags; /* STK_* */
530 union {
531 struct stktable *t; /* target table */
532 char *name; /* target table name during config parsing */
533 } table;
534};
535
536
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200537struct redirect_rule {
538 struct list list; /* list linked to from the proxy */
539 struct acl_cond *cond; /* acl condition to meet */
540 int type;
541 int rdr_len;
542 char *rdr_str;
Thierry FOURNIERd18cd0f2013-11-29 12:15:45 +0100543 struct list rdr_fmt;
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200544 int code;
Willy Tarreau79da4692008-11-19 20:03:04 +0100545 unsigned int flags;
Willy Tarreau0140f252008-11-19 21:07:09 +0100546 int cookie_len;
547 char *cookie_str;
Willy Tarreaub463dfb2008-06-07 23:08:56 +0200548};
549
Willy Tarreau3a1f5fd2018-11-11 15:40:36 +0100550/* some of the most common options which are also the easiest to handle */
551struct cfg_opt {
552 const char *name;
553 unsigned int val;
554 unsigned int cap;
555 unsigned int checks;
556 unsigned int mode;
557};
558
Willy Tarreaubaaee002006-06-26 02:48:02 +0200559#endif /* _TYPES_PROXY_H */
560
561/*
562 * Local variables:
563 * c-indent-level: 8
564 * c-basic-offset: 8
565 * End:
566 */