blob: bfd6547ee7ac41cde86fb953a4dacedee24d8bab [file] [log] [blame]
Willy Tarreau56e9c5e2012-07-06 09:47:57 +02001/*
2 * include/types/connection.h
3 * This file describes the connection struct and associated constants.
4 *
Willy Tarreaubaf5b9b2014-01-23 15:26:18 +01005 * Copyright (C) 2000-2014 Willy Tarreau - w@1wt.eu
Willy Tarreau56e9c5e2012-07-06 09:47:57 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22#ifndef _TYPES_CONNECTION_H
23#define _TYPES_CONNECTION_H
24
25#include <stdlib.h>
26#include <sys/socket.h>
27
28#include <common/config.h>
Willy Tarreau2386be62017-09-21 19:40:52 +020029#include <common/ist.h>
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020030
Willy Tarreaud1d54542012-09-12 22:58:11 +020031#include <types/listener.h>
Willy Tarreau3fdb3662012-11-12 00:42:33 +010032#include <types/obj_type.h>
Willy Tarreauef9a3602012-12-08 22:29:20 +010033#include <types/port_range.h>
Willy Tarreaud1d54542012-09-12 22:58:11 +020034#include <types/protocol.h>
35
Willy Tarreaud2629f22016-08-10 18:57:38 +020036#include <netinet/in_systm.h>
Bertrand Jacquin93b227d2016-06-04 15:11:10 +010037#include <netinet/ip.h>
38#include <netinet/ip6.h>
Bertrand Jacquin93b227d2016-06-04 15:11:10 +010039
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020040/* referenced below */
Willy Tarreauc5788912012-08-24 18:12:41 +020041struct connection;
Olivier Houcharde2b40b92017-09-13 18:30:23 +020042struct conn_stream;
Christopher Faulet3bc1b112018-11-29 11:29:26 +010043struct cs_info;
Willy Tarreauc5788912012-08-24 18:12:41 +020044struct buffer;
Willy Tarreau175a2bb2018-09-12 12:02:05 +020045struct proxy;
Willy Tarreaud84dab72016-12-22 21:13:18 +010046struct server;
Olivier Houchardf502aca2018-12-14 19:42:40 +010047struct session;
Willy Tarreauc5788912012-08-24 18:12:41 +020048struct pipe;
Willy Tarreau56e9c5e2012-07-06 09:47:57 +020049
Alexander Liu2a54bb72019-05-22 19:44:48 +080050/* socks4 upstream proxy definitions */
51struct socks4_request {
52 uint8_t version; /* SOCKS version number, 1 byte, must be 0x04 for this version */
53 uint8_t command; /* 0x01 = establish a TCP/IP stream connection */
54 uint16_t port; /* port number, 2 bytes (in network byte order) */
55 uint32_t ip; /* IP address, 4 bytes (in network byte order) */
56 char user_id[8]; /* the user ID string, variable length, terminated with a null (0x00); Using "HAProxy\0" */
57};
58
Willy Tarreau4f6516d2018-12-19 13:59:17 +010059/* Note: subscribing to these events is only valid after the caller has really
60 * attempted to perform the operation, and failed to proceed or complete.
61 */
Olivier Houcharde1c6dbc2018-08-01 17:06:43 +020062enum sub_event_type {
Willy Tarreau4f6516d2018-12-19 13:59:17 +010063 SUB_RETRY_RECV = 0x00000001, /* Schedule the tasklet when we can attempt to recv again */
64 SUB_RETRY_SEND = 0x00000002, /* Schedule the tasklet when we can attempt to send again */
Olivier Houcharde1c6dbc2018-08-01 17:06:43 +020065};
66
Willy Tarreau7872d1f2020-01-10 07:06:05 +010067/* Describes a set of subscriptions. Multiple events may be registered at the
68 * same time. The callee should assume everything not pending for completion is
69 * implicitly possible. It's illegal to change the tasklet if events are still
70 * registered.
71 */
Olivier Houchardfa8aa862018-10-10 18:25:41 +020072struct wait_event {
Willy Tarreau3c39a7d2019-06-14 14:42:29 +020073 struct tasklet *tasklet;
Willy Tarreau4f6516d2018-12-19 13:59:17 +010074 int events; /* set of enum sub_event_type above */
Olivier Houchard6ff20392018-07-17 18:46:31 +020075};
Willy Tarreau585744b2017-08-24 14:31:19 +020076
Bertrand Jacquind5e4de82018-10-13 16:06:18 +010077/* A connection handle is how we differentiate two connections on the lower
Willy Tarreau585744b2017-08-24 14:31:19 +020078 * layers. It usually is a file descriptor but can be a connection id.
79 */
80union conn_handle {
81 int fd; /* file descriptor, for regular sockets */
82};
83
Olivier Houcharde2b40b92017-09-13 18:30:23 +020084/* conn_stream flags */
85enum {
86 CS_FL_NONE = 0x00000000, /* Just for initialization purposes */
Willy Tarreau79dadb52017-10-05 15:06:07 +020087 CS_FL_SHRD = 0x00000010, /* read shut, draining extra data */
88 CS_FL_SHRR = 0x00000020, /* read shut, resetting extra data */
89 CS_FL_SHR = CS_FL_SHRD | CS_FL_SHRR, /* read shut status */
90
91 CS_FL_SHWN = 0x00000040, /* write shut, verbose mode */
92 CS_FL_SHWS = 0x00000080, /* write shut, silent mode */
93 CS_FL_SHW = CS_FL_SHWN | CS_FL_SHWS, /* write shut status */
94
95
Olivier Houcharde2b40b92017-09-13 18:30:23 +020096 CS_FL_ERROR = 0x00000100, /* a fatal error was reported */
Olivier Houchardd247be02018-12-06 16:22:29 +010097 CS_FL_RCV_MORE = 0x00000200, /* We may have more bytes to transfert */
98 CS_FL_WANT_ROOM = 0x00000400, /* More bytes to transfert, but not enough room */
Olivier Houchard71748cb2018-12-17 14:16:46 +010099 CS_FL_ERR_PENDING = 0x00000800, /* An error is pending, but there's still data to be read */
Willy Tarreaua3f7efe2018-03-02 12:25:45 +0100100 CS_FL_EOS = 0x00001000, /* End of stream delivered to data layer */
Willy Tarreau7bb39d72019-06-03 14:23:33 +0200101 /* unused: 0x00002000 */
Christopher Faulet87a8f352019-03-22 14:51:36 +0100102 CS_FL_EOI = 0x00004000, /* end-of-input reached */
Willy Tarreau17ccd1a2020-01-17 16:19:34 +0100103 CS_FL_MAY_SPLICE = 0x00008000, /* caller may use rcv_pipe() only if this flag is set */
Olivier Houchard6fa63d92017-11-27 18:41:32 +0100104 CS_FL_WAIT_FOR_HS = 0x00010000, /* This stream is waiting for handhskae */
Willy Tarreau51d0a7e2019-01-31 19:09:59 +0100105 CS_FL_KILL_CONN = 0x00020000, /* must kill the connection when the CS closes */
Christopher Faulet08088e72018-10-01 12:10:13 +0200106
Christopher Fauleteffc3752018-10-31 08:53:54 +0100107 /* following flags are supposed to be set by the mux and read/unset by
108 * the stream-interface :
109 */
110 CS_FL_NOT_FIRST = 0x00100000, /* this stream is not the first one */
Joseph Herlant8a95a6e2018-11-25 13:21:12 -0800111 CS_FL_READ_PARTIAL = 0x00200000, /* some data were received (not necessarily xferred) */
Olivier Houcharde2b40b92017-09-13 18:30:23 +0200112};
Willy Tarreau585744b2017-08-24 14:31:19 +0200113
Willy Tarreau79dadb52017-10-05 15:06:07 +0200114/* cs_shutr() modes */
115enum cs_shr_mode {
116 CS_SHR_DRAIN = 0, /* read shutdown, drain any extra stuff */
117 CS_SHR_RESET = 1, /* read shutdown, reset any extra stuff */
118};
119
120/* cs_shutw() modes */
121enum cs_shw_mode {
122 CS_SHW_NORMAL = 0, /* regular write shutdown */
123 CS_SHW_SILENT = 1, /* imminent close, don't notify peer */
124};
125
Willy Tarreau3381bf82020-01-17 17:39:35 +0100126/* For each direction, we have a CO_FL_XPRT_<DIR>_ENA flag, which
Willy Tarreaubaf5b9b2014-01-23 15:26:18 +0100127 * indicates if read or write is desired in that direction for the respective
128 * layers. The current status corresponding to the current layer being used is
Willy Tarreau3381bf82020-01-17 17:39:35 +0100129 * remembered in the CO_FL_XPRT_<DIR>_ENA flag. The need to poll (ie receipt of
Willy Tarreaubaf5b9b2014-01-23 15:26:18 +0100130 * EAGAIN) is remembered at the file descriptor level so that even when the
131 * activity is stopped and restarted, we still remember whether it was needed
132 * to poll before attempting the I/O.
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200133 *
Willy Tarreau3381bf82020-01-17 17:39:35 +0100134 * The FD state is updated according to CO_FL_XPRT_<DIR>_ENA in
135 * conn_cond_update_polling().
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200136 */
137
Willy Tarreau900bc932012-07-06 09:52:14 +0200138/* flags for use in connection->flags */
139enum {
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200140 CO_FL_NONE = 0x00000000, /* Just for initialization purposes */
Willy Tarreauc76ae332012-07-12 15:32:13 +0200141
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200142 /* Do not change these values without updating conn_*_poll_changes() ! */
Willy Tarreau3381bf82020-01-17 17:39:35 +0100143 /* unused : 0x00000001 */
Willy Tarreau19bc2012020-02-21 08:46:19 +0100144 /* unused : 0x00000002 */
Willy Tarreau3381bf82020-01-17 17:39:35 +0100145 /* unused : 0x00000004, 0x00000008 */
Willy Tarreauc8dd77f2012-11-05 17:52:26 +0100146
Olivier Houchard03abf2d2019-05-28 10:12:02 +0200147 /* unused : 0x00000010 */
Willy Tarreau19bc2012020-02-21 08:46:19 +0100148 /* unused : 0x00000020 */
Willy Tarreau3381bf82020-01-17 17:39:35 +0100149 /* unused : 0x00000040, 0x00000080 */
Willy Tarreauc76ae332012-07-12 15:32:13 +0200150
Willy Tarreauf79c8172013-10-21 16:30:56 +0200151 /* These flags indicate whether the Control and Transport layers are initialized */
152 CO_FL_CTRL_READY = 0x00000100, /* FD was registered, fd_delete() needed */
153 CO_FL_XPRT_READY = 0x00000200, /* xprt_init() done, xprt_close() needed */
154
Willy Tarreau19bc2012020-02-21 08:46:19 +0100155 /* unused : 0x00000400 */
Willy Tarreau2686dca2017-04-26 16:25:12 +0200156
157 /* This flag is used by data layers to indicate they had to stop
158 * receiving data because a buffer was full. The connection handler
159 * clears it before first calling the I/O and data callbacks.
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200160 */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200161 CO_FL_WAIT_ROOM = 0x00000800, /* data sink is full */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200162
Willy Tarreau986a9d22012-08-30 21:11:38 +0200163 /* These flags are used to report whether the from/to addresses are set or not */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200164 CO_FL_ADDR_FROM_SET = 0x00001000, /* addr.from is set */
165 CO_FL_ADDR_TO_SET = 0x00002000, /* addr.to is set */
166
Olivier Houchardc2aae742017-09-22 18:26:28 +0200167 CO_FL_EARLY_SSL_HS = 0x00004000, /* We have early data pending, don't start SSL handshake yet */
168 CO_FL_EARLY_DATA = 0x00008000, /* At least some of the data are early data */
Alexander Liu2a54bb72019-05-22 19:44:48 +0800169 CO_FL_SOCKS4_SEND = 0x00010000, /* handshaking with upstream SOCKS4 proxy, going to send the handshake */
170 CO_FL_SOCKS4_RECV = 0x00020000, /* handshaking with upstream SOCKS4 proxy, going to check if handshake succeed */
Willy Tarreau2ba44652012-08-20 17:30:32 +0200171
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200172 /* flags used to remember what shutdown have been performed/reported */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200173 CO_FL_SOCK_RD_SH = 0x00040000, /* SOCK layer was notified about shutr/read0 */
174 CO_FL_SOCK_WR_SH = 0x00080000, /* SOCK layer asked for shutw */
175
Willy Tarreau3c0cc492017-03-19 07:54:28 +0100176 /* flags used to report connection errors or other closing conditions */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200177 CO_FL_ERROR = 0x00100000, /* a fatal error was reported */
Willy Tarreau8e3c6ce2017-08-28 15:46:01 +0200178 CO_FL_NOTIFY_DONE = 0x001C0000, /* any xprt shut/error flags above needs to be reported */
Willy Tarreau3c0cc492017-03-19 07:54:28 +0100179
180 /* flags used to report connection status updates */
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200181 CO_FL_WAIT_L4_CONN = 0x00400000, /* waiting for L4 to be connected */
182 CO_FL_WAIT_L6_CONN = 0x00800000, /* waiting for L6 to be connected (eg: SSL) */
Willy Tarreauc192b0a2020-01-23 09:11:58 +0100183 CO_FL_WAIT_L4L6 = 0x00C00000, /* waiting for L4 and/or L6 to be connected */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200184
Willy Tarreau4450b582020-01-23 15:23:13 +0100185 /* All the flags below are used for connection handshakes. Any new
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200186 * handshake should be added after this point, and CO_FL_HANDSHAKE
187 * should be updated.
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200188 */
Willy Tarreau57cd3e42013-10-24 22:01:26 +0200189 CO_FL_SEND_PROXY = 0x01000000, /* send a valid PROXY protocol header */
Willy Tarreau4450b582020-01-23 15:23:13 +0100190 CO_FL_ACCEPT_PROXY = 0x02000000, /* receive a valid PROXY protocol header */
191 CO_FL_ACCEPT_CIP = 0x04000000, /* receive a valid NetScaler Client IP header */
Willy Tarreaue9dfa792012-09-01 17:26:16 +0200192
Willy Tarreauf3a6d7e2012-10-03 20:00:18 +0200193 /* below we have all handshake flags grouped into one */
Willy Tarreau4450b582020-01-23 15:23:13 +0100194 CO_FL_HANDSHAKE = CO_FL_SEND_PROXY | CO_FL_ACCEPT_PROXY | CO_FL_ACCEPT_CIP | CO_FL_SOCKS4_SEND | CO_FL_SOCKS4_RECV,
Willy Tarreau911db9b2020-01-23 16:27:54 +0100195 CO_FL_WAIT_XPRT = CO_FL_WAIT_L4_CONN | CO_FL_HANDSHAKE | CO_FL_WAIT_L6_CONN,
Willy Tarreau4450b582020-01-23 15:23:13 +0100196
197 CO_FL_SSL_WAIT_HS = 0x08000000, /* wait for an SSL handshake to complete */
Willy Tarreaub5e2cbd2012-08-17 11:55:04 +0200198
Willy Tarreau387ebf82015-08-04 19:24:13 +0200199 /* This connection may not be shared between clients */
200 CO_FL_PRIVATE = 0x10000000,
201
Emeric Brun4f603012017-01-05 15:11:44 +0100202 /* This flag is used to know that a PROXY protocol header was sent by the client */
203 CO_FL_RCVD_PROXY = 0x20000000,
204
Olivier Houcharda2dbeb22018-12-28 18:50:57 +0100205 /* The connection is unused by its owner */
206 CO_FL_SESS_IDLE = 0x40000000,
Willy Tarreauf79c8172013-10-21 16:30:56 +0200207
Willy Tarreau1e954912012-10-12 17:50:05 +0200208 /* This last flag indicates that the transport layer is used (for instance
209 * by logs) and must not be cleared yet. The last call to conn_xprt_close()
210 * must be done after clearing this flag.
211 */
212 CO_FL_XPRT_TRACKED = 0x80000000,
Willy Tarreau900bc932012-07-06 09:52:14 +0200213
Alexander Liu2a54bb72019-05-22 19:44:48 +0800214 /* below we have all SOCKS handshake flags grouped into one */
215 CO_FL_SOCKS4 = CO_FL_SOCKS4_SEND | CO_FL_SOCKS4_RECV,
216};
Willy Tarreau14cba4b2012-11-30 17:33:05 +0100217
218/* possible connection error codes */
219enum {
220 CO_ER_NONE, /* no error */
Willy Tarreau45b34e82014-01-24 16:06:50 +0100221
222 CO_ER_CONF_FDLIM, /* reached process' configured FD limitation */
223 CO_ER_PROC_FDLIM, /* reached process' FD limitation */
224 CO_ER_SYS_FDLIM, /* reached system's FD limitation */
225 CO_ER_SYS_MEMLIM, /* reached system buffers limitation */
226 CO_ER_NOPROTO, /* protocol not supported */
227 CO_ER_SOCK_ERR, /* other socket error */
228
229 CO_ER_PORT_RANGE, /* source port range exhausted */
230 CO_ER_CANT_BIND, /* can't bind to source address */
231 CO_ER_FREE_PORTS, /* no more free ports on the system */
232 CO_ER_ADDR_INUSE, /* local address already in use */
233
Willy Tarreau8e3bf692012-12-03 15:41:18 +0100234 CO_ER_PRX_EMPTY, /* nothing received in PROXY protocol header */
235 CO_ER_PRX_ABORT, /* client abort during PROXY protocol header */
Willy Tarreau0af29122012-12-03 15:35:00 +0100236 CO_ER_PRX_TIMEOUT, /* timeout while waiting for a PROXY header */
Willy Tarreau8e3bf692012-12-03 15:41:18 +0100237 CO_ER_PRX_TRUNCATED, /* truncated PROXY protocol header */
238 CO_ER_PRX_NOT_HDR, /* not a PROXY protocol header */
239 CO_ER_PRX_BAD_HDR, /* bad PROXY protocol header */
240 CO_ER_PRX_BAD_PROTO, /* unsupported protocol in PROXY header */
241
Bertrand Jacquin93b227d2016-06-04 15:11:10 +0100242 CO_ER_CIP_EMPTY, /* nothing received in NetScaler Client IP header */
243 CO_ER_CIP_ABORT, /* client abort during NetScaler Client IP header */
244 CO_ER_CIP_TIMEOUT, /* timeout while waiting for a NetScaler Client IP header */
245 CO_ER_CIP_TRUNCATED, /* truncated NetScaler Client IP header */
246 CO_ER_CIP_BAD_MAGIC, /* bad magic number in NetScaler Client IP header */
247 CO_ER_CIP_BAD_PROTO, /* unsupported protocol in NetScaler Client IP header */
248
Willy Tarreau20879a02012-12-03 16:32:10 +0100249 CO_ER_SSL_EMPTY, /* client closed during SSL handshake */
250 CO_ER_SSL_ABORT, /* client abort during SSL handshake */
Willy Tarreau0af29122012-12-03 15:35:00 +0100251 CO_ER_SSL_TIMEOUT, /* timeout during SSL handshake */
Willy Tarreau20879a02012-12-03 16:32:10 +0100252 CO_ER_SSL_TOO_MANY, /* too many SSL connections */
253 CO_ER_SSL_NO_MEM, /* no more memory to allocate an SSL connection */
254 CO_ER_SSL_RENEG, /* forbidden client renegociation */
255 CO_ER_SSL_CA_FAIL, /* client cert verification failed in the CA chain */
256 CO_ER_SSL_CRT_FAIL, /* client cert verification failed on the certificate */
Willy Tarreau71d058c2017-07-26 20:09:56 +0200257 CO_ER_SSL_MISMATCH, /* Server presented an SSL certificate different from the configured one */
258 CO_ER_SSL_MISMATCH_SNI, /* Server presented an SSL certificate different from the expected one */
Willy Tarreau20879a02012-12-03 16:32:10 +0100259 CO_ER_SSL_HANDSHAKE, /* SSL error during handshake */
Willy Tarreaub3966372014-04-25 18:54:29 +0200260 CO_ER_SSL_HANDSHAKE_HB, /* SSL error during handshake with heartbeat present */
Willy Tarreauf51c6982014-04-25 20:02:39 +0200261 CO_ER_SSL_KILLED_HB, /* Stopped a TLSv1 heartbeat attack (CVE-2014-0160) */
262 CO_ER_SSL_NO_TARGET, /* unknown target (not client nor server) */
Olivier Houchard522eea72017-11-03 16:27:47 +0100263 CO_ER_SSL_EARLY_FAILED, /* Server refused early data */
Alexander Liu2a54bb72019-05-22 19:44:48 +0800264
265 CO_ER_SOCKS4_SEND, /* SOCKS4 Proxy write error during handshake */
266 CO_ER_SOCKS4_RECV, /* SOCKS4 Proxy read error during handshake */
267 CO_ER_SOCKS4_DENY, /* SOCKS4 Proxy deny the request */
268 CO_ER_SOCKS4_ABORT, /* SOCKS4 Proxy handshake aborted by server */
Willy Tarreau14cba4b2012-11-30 17:33:05 +0100269};
270
Willy Tarreauef9a3602012-12-08 22:29:20 +0100271/* source address settings for outgoing connections */
272enum {
273 /* Tproxy exclusive values from 0 to 7 */
274 CO_SRC_TPROXY_ADDR = 0x0001, /* bind to this non-local address when connecting */
275 CO_SRC_TPROXY_CIP = 0x0002, /* bind to the client's IP address when connecting */
276 CO_SRC_TPROXY_CLI = 0x0003, /* bind to the client's IP+port when connecting */
277 CO_SRC_TPROXY_DYN = 0x0004, /* bind to a dynamically computed non-local address */
278 CO_SRC_TPROXY_MASK = 0x0007, /* bind to a non-local address when connecting */
279
280 CO_SRC_BIND = 0x0008, /* bind to a specific source address when connecting */
281};
282
Willy Tarreau337ea572018-06-19 06:23:38 +0200283/* flags that can be passed to xprt->rcv_buf() and mux->rcv_buf() */
284enum {
285 CO_RFL_BUF_WET = 0x0001, /* Buffer still has some output data present */
Christopher Fauletc6618d62018-10-11 15:56:04 +0200286 CO_RFL_BUF_FLUSH = 0x0002, /* Flush mux's buffers but don't read more data */
Willy Tarreau716bec22020-02-20 11:04:40 +0100287 CO_RFL_READ_ONCE = 0x0004, /* don't loop even if the request/response is small */
Willy Tarreau337ea572018-06-19 06:23:38 +0200288};
289
290/* flags that can be passed to xprt->snd_buf() and mux->snd_buf() */
Willy Tarreau1049b1f2014-02-02 01:51:17 +0100291enum {
292 CO_SFL_MSG_MORE = 0x0001, /* More data to come afterwards */
Willy Tarreau7bed9452014-02-02 02:00:24 +0100293 CO_SFL_STREAMER = 0x0002, /* Producer is continuously streaming data */
Willy Tarreau1049b1f2014-02-02 01:51:17 +0100294};
Willy Tarreauef9a3602012-12-08 22:29:20 +0100295
Willy Tarreau13e14102016-12-22 20:25:26 +0100296/* known transport layers (for ease of lookup) */
297enum {
298 XPRT_RAW = 0,
299 XPRT_SSL = 1,
Olivier Houchardfe50bfb2019-05-27 12:09:19 +0200300 XPRT_HANDSHAKE = 2,
Willy Tarreau13e14102016-12-22 20:25:26 +0100301 XPRT_ENTRIES /* must be last one */
302};
303
Willy Tarreau28f1cb92017-12-20 16:14:44 +0100304/* MUX-specific flags */
305enum {
306 MX_FL_NONE = 0x00000000,
307 MX_FL_CLEAN_ABRT = 0x00000001, /* abort is clearly reported as an error */
Christopher Faulet9f38f5a2019-04-03 09:53:32 +0200308 MX_FL_HTX = 0x00000002, /* set if it is an HTX multiplexer */
Willy Tarreau28f1cb92017-12-20 16:14:44 +0100309};
310
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200311/* xprt_ops describes transport-layer operations for a connection. They
312 * generally run over a socket-based control layer, but not always. Some
313 * of them are used for data transfer with the upper layer (rcv_*, snd_*)
314 * and the other ones are used to setup and release the transport layer.
Willy Tarreauc5788912012-08-24 18:12:41 +0200315 */
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200316struct xprt_ops {
Olivier Houcharde179d0e2019-03-21 18:27:17 +0100317 size_t (*rcv_buf)(struct connection *conn, void *xprt_ctx, struct buffer *buf, size_t count, int flags); /* recv callback */
318 size_t (*snd_buf)(struct connection *conn, void *xprt_ctx, const struct buffer *buf, size_t count, int flags); /* send callback */
319 int (*rcv_pipe)(struct connection *conn, void *xprt_ctx, struct pipe *pipe, unsigned int count); /* recv-to-pipe callback */
320 int (*snd_pipe)(struct connection *conn, void *xprt_ctx, struct pipe *pipe); /* send-to-pipe callback */
321 void (*shutr)(struct connection *conn, void *xprt_ctx, int); /* shutr function */
322 void (*shutw)(struct connection *conn, void *xprt_ctx, int); /* shutw function */
323 void (*close)(struct connection *conn, void *xprt_ctx); /* close the transport layer */
324 int (*init)(struct connection *conn, void **ctx); /* initialize the transport layer */
Willy Tarreau5aacf782016-12-22 17:19:24 +0100325 int (*prepare_bind_conf)(struct bind_conf *conf); /* prepare a whole bind_conf */
Willy Tarreaufa983d32016-12-22 17:30:20 +0100326 void (*destroy_bind_conf)(struct bind_conf *conf); /* destroy a whole bind_conf */
Willy Tarreaud84dab72016-12-22 21:13:18 +0100327 int (*prepare_srv)(struct server *srv); /* prepare a server context */
328 void (*destroy_srv)(struct server *srv); /* destroy a server context */
Olivier Houcharde179d0e2019-03-21 18:27:17 +0100329 int (*get_alpn)(const struct connection *conn, void *xprt_ctx, const char **str, int *len); /* get application layer name */
Willy Tarreau8e0bb0a2016-11-24 16:58:12 +0100330 char name[8]; /* transport layer name, zero-terminated */
Willy Tarreauee1a6fc2020-01-17 07:52:13 +0100331 int (*subscribe)(struct connection *conn, void *xprt_ctx, int event_type, struct wait_event *es); /* Subscribe <es> to events, such as "being able to send" */
332 int (*unsubscribe)(struct connection *conn, void *xprt_ctx, int event_type, struct wait_event *es); /* Unsubscribe <es> from events */
Olivier Houchard5149b592019-05-23 17:47:36 +0200333 int (*remove_xprt)(struct connection *conn, void *xprt_ctx, void *toremove_ctx, const struct xprt_ops *newops, void *newctx); /* Remove an xprt from the connection, used by temporary xprt such as the handshake one */
Olivier Houchard2e055482019-05-27 19:50:12 +0200334 int (*add_xprt)(struct connection *conn, void *xprt_ctx, void *toadd_ctx, const struct xprt_ops *toadd_ops, void **oldxprt_ctx, const struct xprt_ops **oldxprt_ops); /* Add a new XPRT as the new xprt, and return the old one */
Willy Tarreauc5788912012-08-24 18:12:41 +0200335};
336
Olivier Houchard9b8e11e2019-10-25 16:19:26 +0200337enum mux_ctl_type {
338 MUX_STATUS, /* Expects an int as output, sets it to a combinaison of MUX_STATUS flags */
339};
340
341#define MUX_STATUS_READY (1 << 0)
342
Willy Tarreau53a47662017-08-28 10:53:00 +0200343/* mux_ops describes the mux operations, which are to be performed at the
344 * connection level after data are exchanged with the transport layer in order
345 * to propagate them to streams. The <init> function will automatically be
346 * called once the mux is instanciated by the connection's owner at the end
347 * of a transport handshake, when it is about to transfer data and the data
348 * layer is not ready yet.
349 */
350struct mux_ops {
Christopher Faulet51f73eb2019-04-08 11:22:47 +0200351 int (*init)(struct connection *conn, struct proxy *prx, struct session *sess, struct buffer *input); /* early initialization */
Willy Tarreau53a47662017-08-28 10:53:00 +0200352 int (*wake)(struct connection *conn); /* mux-layer callback to report activity, mandatory */
Willy Tarreau7f3225f2018-06-19 06:15:17 +0200353 size_t (*rcv_buf)(struct conn_stream *cs, struct buffer *buf, size_t count, int flags); /* Called from the upper layer to get data */
Christopher Fauletd44a9b32018-07-27 11:59:41 +0200354 size_t (*snd_buf)(struct conn_stream *cs, struct buffer *buf, size_t count, int flags); /* Called from the upper layer to send data */
Olivier Houchard8e614722017-09-13 18:30:23 +0200355 int (*rcv_pipe)(struct conn_stream *cs, struct pipe *pipe, unsigned int count); /* recv-to-pipe callback */
356 int (*snd_pipe)(struct conn_stream *cs, struct pipe *pipe); /* send-to-pipe callback */
Willy Tarreauecdb3fe2017-10-05 15:25:48 +0200357 void (*shutr)(struct conn_stream *cs, enum cs_shr_mode); /* shutr function */
358 void (*shutw)(struct conn_stream *cs, enum cs_shw_mode); /* shutw function */
Olivier Houchard8e614722017-09-13 18:30:23 +0200359
Olivier Houchardf502aca2018-12-14 19:42:40 +0100360 struct conn_stream *(*attach)(struct connection *, struct session *sess); /* Create and attach a conn_stream to an outgoing connection */
Willy Tarreaufafd3982018-11-18 21:29:20 +0100361 const struct conn_stream *(*get_first_cs)(const struct connection *); /* retrieves any valid conn_stream from this connection */
Olivier Houchard8e614722017-09-13 18:30:23 +0200362 void (*detach)(struct conn_stream *); /* Detach a conn_stream from an outgoing connection, when the request is done */
Willy Tarreau83061a82018-07-13 11:56:34 +0200363 void (*show_fd)(struct buffer *, struct connection *); /* append some data about connection into chunk for "show fd" */
Willy Tarreauee1a6fc2020-01-17 07:52:13 +0100364 int (*subscribe)(struct conn_stream *cs, int event_type, struct wait_event *es); /* Subscribe <es> to events, such as "being able to send" */
365 int (*unsubscribe)(struct conn_stream *cs, int event_type, struct wait_event *es); /* Unsubscribe <es> from events */
Olivier Houchardd540b362018-11-05 18:37:53 +0100366 int (*avail_streams)(struct connection *conn); /* Returns the number of streams still available for a connection */
Willy Tarreau00f18a32019-01-26 12:19:01 +0100367 int (*used_streams)(struct connection *conn); /* Returns the number of streams in use on a connection. */
Christopher Faulet73c12072019-04-08 11:23:22 +0200368 void (*destroy)(void *ctx); /* Let the mux know one of its users left, so it may have to disappear */
Olivier Houchard9a86fcb2018-12-11 16:47:14 +0100369 void (*reset)(struct connection *conn); /* Reset the mux, because we're re-trying to connect */
Christopher Faulet3bc1b112018-11-29 11:29:26 +0100370 const struct cs_info *(*get_cs_info)(struct conn_stream *cs); /* Return info on the specified conn_stream or NULL if not defined */
Olivier Houchard9b8e11e2019-10-25 16:19:26 +0200371 int (*ctl)(struct connection *conn, enum mux_ctl_type mux_ctl, void *arg); /* Provides informations about the mux */
Willy Tarreau28f1cb92017-12-20 16:14:44 +0100372 unsigned int flags; /* some flags characterizing the mux's capabilities (MX_FL_*) */
Willy Tarreau53a47662017-08-28 10:53:00 +0200373 char name[8]; /* mux layer name, zero-terminated */
374};
375
Willy Tarreau74beec32012-10-03 00:41:04 +0200376/* data_cb describes the data layer's recv and send callbacks which are called
Willy Tarreauf7bc57c2012-10-03 00:19:48 +0200377 * when I/O activity was detected after the transport layer is ready. These
378 * callbacks are supposed to make use of the xprt_ops above to exchange data
Willy Tarreau4aa36832012-10-02 20:07:22 +0200379 * from/to buffers and pipes. The <wake> callback is used to report activity
380 * at the transport layer, which can be a connection opening/close, or any
Willy Tarreau8e3c6ce2017-08-28 15:46:01 +0200381 * data movement. It may abort a connection by returning < 0.
Willy Tarreauc5788912012-08-24 18:12:41 +0200382 */
Willy Tarreau74beec32012-10-03 00:41:04 +0200383struct data_cb {
Olivier Houchard9aaf7782017-09-13 18:30:23 +0200384 int (*wake)(struct conn_stream *cs); /* data-layer callback to report activity */
Willy Tarreau8e0bb0a2016-11-24 16:58:12 +0100385 char name[8]; /* data layer name, zero-terminated */
Willy Tarreauc5788912012-08-24 18:12:41 +0200386};
387
David Carlier3015a2e2016-07-04 22:51:33 +0100388struct my_tcphdr {
David Carlier327298c2016-11-20 10:42:38 +0000389 uint16_t source;
390 uint16_t dest;
David Carlier3015a2e2016-07-04 22:51:33 +0100391};
392
Willy Tarreauef9a3602012-12-08 22:29:20 +0100393/* a connection source profile defines all the parameters needed to properly
394 * bind an outgoing connection for a server or proxy.
395 */
396
397struct conn_src {
398 unsigned int opts; /* CO_SRC_* */
399 int iface_len; /* bind interface name length */
400 char *iface_name; /* bind interface name or NULL */
401 struct port_range *sport_range; /* optional per-server TCP source ports */
402 struct sockaddr_storage source_addr; /* the address to which we want to bind for connect() */
Willy Tarreau29fbe512015-08-20 19:35:14 +0200403#if defined(CONFIG_HAP_TRANSPARENT)
Willy Tarreauef9a3602012-12-08 22:29:20 +0100404 struct sockaddr_storage tproxy_addr; /* non-local address we want to bind to for connect() */
405 char *bind_hdr_name; /* bind to this header name if defined */
406 int bind_hdr_len; /* length of the name of the header above */
407 int bind_hdr_occ; /* occurrence number of header above: >0 = from first, <0 = from end, 0=disabled */
408#endif
409};
410
Olivier Houcharde2b40b92017-09-13 18:30:23 +0200411/*
412 * This structure describes the elements of a connection relevant to a stream
413 */
414struct conn_stream {
415 enum obj_type obj_type; /* differentiates connection from applet context */
Willy Tarreau5e1cc5e2018-03-02 10:43:58 +0100416 /* 3 bytes hole here */
Olivier Houchard6ff20392018-07-17 18:46:31 +0200417 unsigned int flags; /* CS_FL_* */
Olivier Houcharde2b40b92017-09-13 18:30:23 +0200418 struct connection *conn; /* xprt-level connection */
Olivier Houcharde2b40b92017-09-13 18:30:23 +0200419 void *data; /* pointer to upper layer's entity (eg: stream interface) */
420 const struct data_cb *data_cb; /* data layer callbacks. Must be set before xprt->init() */
421 void *ctx; /* mux-specific context */
422};
423
Christopher Faulet3bc1b112018-11-29 11:29:26 +0100424/*
425 * This structure describes the info related to a conn_stream known by the mux
426 * only but usefull for the upper layer.
427 * For now, only some dates and durations are reported. This structure will
428 * envolved. But for now, only the bare minimum is referenced.
429 */
430struct cs_info {
431 struct timeval create_date; /* Creation date of the conn_stream in user date */
432 struct timeval tv_create; /* Creation date of the conn_stream in internal date (monotonic) */
433 long t_handshake; /* hanshake duration, -1 if never occurs */
434 long t_idle; /* idle duration, -1 if never occurs */
435};
436
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200437/* This structure describes a connection with its methods and data.
438 * A connection may be performed to proxy or server via a local or remote
439 * socket, and can also be made to an internal applet. It can support
Willy Tarreau51c21842013-09-29 09:06:42 +0200440 * several transport schemes (raw, ssl, ...). It can support several
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200441 * connection control schemes, generally a protocol for socket-oriented
Olivier Houchard477902b2020-01-22 18:08:48 +0100442 * connections, but other methods for applets.
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200443 */
444struct connection {
Olivier Houchard6ff20392018-07-17 18:46:31 +0200445 /* first cache line */
Willy Tarreau51c21842013-09-29 09:06:42 +0200446 enum obj_type obj_type; /* differentiates connection from applet context */
Willy Tarreauad5281c2013-12-06 21:09:57 +0100447 unsigned char err_code; /* CO_ER_* */
Alexander Liu2a54bb72019-05-22 19:44:48 +0800448 signed short send_proxy_ofs; /* <0 = offset to (re)send from the end, >0 = send all (reused for SOCKS4) */
Willy Tarreaub8020ce2013-10-24 21:10:08 +0200449 unsigned int flags; /* CO_FL_* */
Willy Tarreauc5788912012-08-24 18:12:41 +0200450 const struct protocol *ctrl; /* operations at the socket layer */
Willy Tarreau378e0412012-10-13 14:33:58 +0200451 const struct xprt_ops *xprt; /* operations at the transport layer */
Willy Tarreau53a47662017-08-28 10:53:00 +0200452 const struct mux_ops *mux; /* mux layer opreations. Must be set before xprt->init() */
Willy Tarreau378e0412012-10-13 14:33:58 +0200453 void *xprt_ctx; /* general purpose pointer, initialized to NULL */
Willy Tarreau3d2ee552018-12-19 14:12:10 +0100454 void *ctx; /* highest level context (usually the mux), initialized to NULL */
Olivier Houchardf3e65b02018-12-02 00:35:08 +0100455 void *owner; /* pointer to the owner session, or NULL */
Olivier Houchard6ff20392018-07-17 18:46:31 +0200456 enum obj_type *target; /* the target to connect to (server, proxy, applet, ...) */
457
458 /* second cache line */
Willy Tarreau7872d1f2020-01-10 07:06:05 +0100459 struct wait_event *subs; /* Task to wake when awaited events are ready */
Olivier Houchard6ff20392018-07-17 18:46:31 +0200460 struct list list; /* attach point to various connection lists (idle, ...) */
Olivier Houchard00cf70f2018-11-30 17:24:55 +0100461 struct list session_list; /* List of attached connections to a session */
Willy Tarreau585744b2017-08-24 14:31:19 +0200462 union conn_handle handle; /* connection handle at the socket layer */
Olivier Houchard6ff20392018-07-17 18:46:31 +0200463 const struct netns_entry *proxy_netns;
Olivier Houchard6ff20392018-07-17 18:46:31 +0200464
465 /* third cache line and beyond */
Willy Tarreau436d3332017-10-08 11:16:46 +0200466 void (*destroy_cb)(struct connection *conn); /* callback to notify of imminent death of the connection */
Willy Tarreau1ef4cbc2019-07-17 14:33:15 +0200467 struct sockaddr_storage *src; /* source address (pool), when known, otherwise NULL */
468 struct sockaddr_storage *dst; /* destination address (pool), when known, otherwise NULL */
Geoff Simmons7185b782019-08-27 18:31:16 +0200469 char *proxy_authority; /* Value of authority TLV received via PROXYv2 */
Olivier Houchard006e3102018-12-10 18:30:32 +0100470 unsigned int idle_time; /* Time the connection was added to the idle list, or 0 if not in the idle list */
Geoff Simmons7185b782019-08-27 18:31:16 +0200471 uint8_t proxy_authority_len; /* Length of authority TLV received via PROXYv2 */
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200472};
473
Christopher Faulet32f61c02018-04-10 14:33:41 +0200474/* PROTO token registration */
475enum proto_proxy_mode {
476 PROTO_MODE_NONE = 0,
477 PROTO_MODE_TCP = 1 << 0, // must not be changed!
478 PROTO_MODE_HTTP = 1 << 1, // must not be changed!
Christopher Fauletc985f6c2019-07-15 11:42:52 +0200479 PROTO_MODE_ANY = PROTO_MODE_TCP | PROTO_MODE_HTTP,
Willy Tarreau2386be62017-09-21 19:40:52 +0200480};
481
Christopher Faulet32f61c02018-04-10 14:33:41 +0200482enum proto_proxy_side {
483 PROTO_SIDE_NONE = 0,
484 PROTO_SIDE_FE = 1, // same as PR_CAP_FE
485 PROTO_SIDE_BE = 2, // same as PR_CAP_BE
486 PROTO_SIDE_BOTH = PROTO_SIDE_FE | PROTO_SIDE_BE,
Christopher Faulet2d5292a2018-03-06 14:43:47 +0100487};
488
Christopher Faulet32f61c02018-04-10 14:33:41 +0200489struct mux_proto_list {
Willy Tarreau2386be62017-09-21 19:40:52 +0200490 const struct ist token; /* token name and length. Empty is catch-all */
Christopher Faulet32f61c02018-04-10 14:33:41 +0200491 enum proto_proxy_mode mode;
492 enum proto_proxy_side side;
Willy Tarreau2386be62017-09-21 19:40:52 +0200493 const struct mux_ops *mux;
494 struct list list;
495};
496
David Safb76832014-05-08 23:42:08 -0400497/* proxy protocol v2 definitions */
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200498#define PP2_SIGNATURE "\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A"
499#define PP2_SIGNATURE_LEN 12
500#define PP2_HEADER_LEN 16
David Safb76832014-05-08 23:42:08 -0400501
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200502/* ver_cmd byte */
503#define PP2_CMD_LOCAL 0x00
504#define PP2_CMD_PROXY 0x01
505#define PP2_CMD_MASK 0x0F
David Safb76832014-05-08 23:42:08 -0400506
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200507#define PP2_VERSION 0x20
508#define PP2_VERSION_MASK 0xF0
509
510/* fam byte */
511#define PP2_TRANS_UNSPEC 0x00
512#define PP2_TRANS_STREAM 0x01
513#define PP2_TRANS_DGRAM 0x02
514#define PP2_TRANS_MASK 0x0F
515
516#define PP2_FAM_UNSPEC 0x00
517#define PP2_FAM_INET 0x10
518#define PP2_FAM_INET6 0x20
519#define PP2_FAM_UNIX 0x30
520#define PP2_FAM_MASK 0xF0
521
522#define PP2_ADDR_LEN_UNSPEC (0)
523#define PP2_ADDR_LEN_INET (4 + 4 + 2 + 2)
524#define PP2_ADDR_LEN_INET6 (16 + 16 + 2 + 2)
525#define PP2_ADDR_LEN_UNIX (108 + 108)
526
527#define PP2_HDR_LEN_UNSPEC (PP2_HEADER_LEN + PP2_ADDR_LEN_UNSPEC)
528#define PP2_HDR_LEN_INET (PP2_HEADER_LEN + PP2_ADDR_LEN_INET)
529#define PP2_HDR_LEN_INET6 (PP2_HEADER_LEN + PP2_ADDR_LEN_INET6)
530#define PP2_HDR_LEN_UNIX (PP2_HEADER_LEN + PP2_ADDR_LEN_UNIX)
David Safb76832014-05-08 23:42:08 -0400531
532struct proxy_hdr_v2 {
533 uint8_t sig[12]; /* hex 0D 0A 0D 0A 00 0D 0A 51 55 49 54 0A */
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200534 uint8_t ver_cmd; /* protocol version and command */
David Safb76832014-05-08 23:42:08 -0400535 uint8_t fam; /* protocol family and transport */
536 uint16_t len; /* number of following bytes part of the header */
Willy Tarreau8fccfa22014-06-14 08:28:06 +0200537 union {
538 struct { /* for TCP/UDP over IPv4, len = 12 */
539 uint32_t src_addr;
540 uint32_t dst_addr;
541 uint16_t src_port;
542 uint16_t dst_port;
543 } ip4;
544 struct { /* for TCP/UDP over IPv6, len = 36 */
545 uint8_t src_addr[16];
546 uint8_t dst_addr[16];
547 uint16_t src_port;
548 uint16_t dst_port;
549 } ip6;
550 struct { /* for AF_UNIX sockets, len = 216 */
551 uint8_t src_addr[108];
552 uint8_t dst_addr[108];
553 } unx;
554 } addr;
David Safb76832014-05-08 23:42:08 -0400555};
556
Emmanuel Hocdet58118b42017-10-13 12:15:28 +0200557#define PP2_TYPE_ALPN 0x01
558#define PP2_TYPE_AUTHORITY 0x02
559#define PP2_TYPE_CRC32C 0x03
560#define PP2_TYPE_NOOP 0x04
561#define PP2_TYPE_SSL 0x20
562#define PP2_SUBTYPE_SSL_VERSION 0x21
563#define PP2_SUBTYPE_SSL_CN 0x22
564#define PP2_SUBTYPE_SSL_CIPHER 0x23
565#define PP2_SUBTYPE_SSL_SIG_ALG 0x24
566#define PP2_SUBTYPE_SSL_KEY_ALG 0x25
567#define PP2_TYPE_NETNS 0x30
David Safb76832014-05-08 23:42:08 -0400568
KOVACS Krisztianb3e54fe2014-11-17 15:11:45 +0100569#define TLV_HEADER_SIZE 3
David Safb76832014-05-08 23:42:08 -0400570struct tlv {
571 uint8_t type;
572 uint8_t length_hi;
573 uint8_t length_lo;
574 uint8_t value[0];
575}__attribute__((packed));
576
577struct tlv_ssl {
578 struct tlv tlv;
579 uint8_t client;
580 uint32_t verify;
581 uint8_t sub_tlv[0];
582}__attribute__((packed));
583
Dave McCowan328fb582014-07-30 10:39:13 -0400584#define PP2_CLIENT_SSL 0x01
585#define PP2_CLIENT_CERT_CONN 0x02
586#define PP2_CLIENT_CERT_SESS 0x04
David Safb76832014-05-08 23:42:08 -0400587
Geoff Simmons7185b782019-08-27 18:31:16 +0200588/* Max length of the authority TLV */
589#define PP2_AUTHORITY_MAX 255
Olivier Houchardf886e342017-04-05 22:24:59 +0200590
591/*
592 * Linux seems to be able to send 253 fds per sendmsg(), not sure
593 * about the other OSes.
594 */
595/* Max number of file descriptors we send in one sendmsg() */
596#define MAX_SEND_FD 253
597
Alexander Liu2a54bb72019-05-22 19:44:48 +0800598#define SOCKS4_HS_RSP_LEN 8
599
Willy Tarreau56e9c5e2012-07-06 09:47:57 +0200600#endif /* _TYPES_CONNECTION_H */
601
602/*
603 * Local variables:
604 * c-indent-level: 8
605 * c-basic-offset: 8
606 * End:
607 */