blob: a8cf5ca6c3d190b31bffa6d808665c5ac5ed7bbe [file] [log] [blame]
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001/*
2 * MAP management functions.
3 *
4 * Copyright 2000-2013 Willy Tarreau <w@1wt.eu>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010013#include <stdio.h>
Willy Tarreau97218ce2021-04-30 14:57:03 +020014#include <syslog.h>
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010015
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020016#include <haproxy/api.h>
Willy Tarreau0fcecc62022-05-03 11:54:47 +020017#include <haproxy/applet.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020018#include <haproxy/arg.h>
Willy Tarreau83487a82020-06-04 20:19:54 +020019#include <haproxy/cli.h>
Willy Tarreau2cd58092020-06-04 15:10:43 +020020#include <haproxy/map.h>
Willy Tarreau225a90a2020-06-04 15:06:28 +020021#include <haproxy/pattern.h>
Willy Tarreau7cd8b6e2020-06-02 17:32:26 +020022#include <haproxy/regex.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020023#include <haproxy/sample.h>
Willy Tarreau5edca2f2022-05-27 09:25:10 +020024#include <haproxy/sc_strm.h>
Willy Tarreau2eec9b52020-06-04 19:58:55 +020025#include <haproxy/stats-t.h>
Willy Tarreaucb086c62022-05-27 09:47:12 +020026#include <haproxy/stconn.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020027#include <haproxy/tools.h>
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010028
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010029
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +020030/* Parse an IPv4 or IPv6 address and store it into the sample.
31 * The output type is IPv4 or IPv6.
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010032 */
Thierry FOURNIER503bb092015-08-19 08:35:43 +020033int map_parse_ip(const char *text, struct sample_data *data)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010034{
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +020035 int len = strlen(text);
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010036
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +020037 if (buf2ip(text, len, &data->u.ipv4)) {
38 data->type = SMP_T_IPV4;
39 return 1;
40 }
41 if (buf2ip6(text, len, &data->u.ipv6)) {
42 data->type = SMP_T_IPV6;
43 return 1;
44 }
45 return 0;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010046}
47
48/* Parse a string and store a pointer to it into the sample. The original
49 * string must be left in memory because we return a direct memory reference.
Thierry FOURNIER7654c9f2013-12-17 00:20:33 +010050 * The output type is SMP_T_STR. There is no risk that the data will be
51 * overwritten because sample_conv_map() makes a const sample with this
52 * output.
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010053 */
Thierry FOURNIER503bb092015-08-19 08:35:43 +020054int map_parse_str(const char *text, struct sample_data *data)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010055{
Willy Tarreau843b7cb2018-07-13 10:54:26 +020056 data->u.str.area = (char *)text;
57 data->u.str.data = strlen(text);
58 data->u.str.size = data->u.str.data + 1;
Thierry FOURNIER503bb092015-08-19 08:35:43 +020059 data->type = SMP_T_STR;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010060 return 1;
61}
62
63/* Parse an integer and convert it to a sample. The output type is SINT if the
64 * number is negative, or UINT if it is positive or null. The function returns
65 * zero (error) if the number is too large.
66 */
Thierry FOURNIER503bb092015-08-19 08:35:43 +020067int map_parse_int(const char *text, struct sample_data *data)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010068{
Thierry FOURNIER503bb092015-08-19 08:35:43 +020069 data->type = SMP_T_SINT;
Thierry FOURNIER136f9d32015-08-19 09:07:19 +020070 data->u.sint = read_int64(&text, text + strlen(text));
Thierry FOURNIER07ee64e2015-07-06 23:43:03 +020071 if (*text != '\0')
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010072 return 0;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010073 return 1;
74}
75
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010076/* This crete and initialize map descriptor.
77 * Return NULL if out of memory error
78 */
Thierry FOURNIER1e00d382014-02-11 11:31:40 +010079static struct map_descriptor *map_create_descriptor(struct sample_conv *conv)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010080{
81 struct map_descriptor *desc;
82
83 desc = calloc(1, sizeof(*desc));
84 if (!desc)
85 return NULL;
86
87 desc->conv = conv;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010088
89 return desc;
90}
91
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +010092/* This function load the map file according with data type declared into
93 * the "struct sample_conv".
94 *
95 * This function choose the indexation type (ebtree or list) according with
96 * the type of match needed.
97 */
Thierry FOURNIER3def3932015-04-07 11:27:54 +020098int sample_load_map(struct arg *arg, struct sample_conv *conv,
99 const char *file, int line, char **err)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100100{
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100101 struct map_descriptor *desc;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100102
Christopher Faulet0eb967d2020-08-05 23:23:37 +0200103 if (!(global.mode & MODE_STARTING)) {
104 memprintf(err, "map: cannot load map at runtime");
105 return 0;
106 }
107
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100108 /* create new map descriptor */
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100109 desc = map_create_descriptor(conv);
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100110 if (!desc) {
111 memprintf(err, "out of memory");
112 return 0;
113 }
114
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100115 /* Initialize pattern */
116 pattern_init_head(&desc->pat);
117
118 /* This is original pattern, must free */
119 desc->do_free = 1;
120
121 /* Set the match method. */
Thierry FOURNIER1edc9712014-12-15 16:18:39 +0100122 desc->pat.match = pat_match_fcts[(long)conv->private];
123 desc->pat.parse = pat_parse_fcts[(long)conv->private];
124 desc->pat.index = pat_index_fcts[(long)conv->private];
Thierry FOURNIER1edc9712014-12-15 16:18:39 +0100125 desc->pat.prune = pat_prune_fcts[(long)conv->private];
126 desc->pat.expect_type = pat_match_types[(long)conv->private];
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100127
128 /* Set the output parse method. */
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100129 switch (desc->conv->out_type) {
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100130 case SMP_T_STR: desc->pat.parse_smp = map_parse_str; break;
Thierry FOURNIER07ee64e2015-07-06 23:43:03 +0200131 case SMP_T_SINT: desc->pat.parse_smp = map_parse_int; break;
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200132 case SMP_T_ADDR: desc->pat.parse_smp = map_parse_ip; break;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100133 default:
134 memprintf(err, "map: internal haproxy error: no default parse case for the input type <%d>.",
135 conv->out_type);
Andreas Seltenreich78f35952016-03-03 20:32:23 +0100136 free(desc);
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100137 return 0;
138 }
139
Thierry FOURNIER39bef452014-01-29 13:29:45 +0100140 /* Load map. */
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200141 if (!pattern_read_from_file(&desc->pat, PAT_REF_MAP, arg[0].data.str.area, PAT_MF_NO_DNS,
Thierry FOURNIER94580c92014-02-11 14:36:45 +0100142 1, err, file, line))
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100143 return 0;
Thierry FOURNIER0ffe78c2013-12-05 14:40:25 +0100144
Willy Tarreauaa5801b2019-04-19 11:35:22 +0200145 /* the maps of type IP support a string as default value. This
146 * string can be an ipv4 or an ipv6, we must convert it.
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200147 */
Willy Tarreauaa5801b2019-04-19 11:35:22 +0200148 if (arg[1].type != ARGT_STOP && desc->conv->out_type == SMP_T_ADDR) {
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200149 struct sample_data data;
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200150 if (!map_parse_ip(arg[1].data.str.area, &data)) {
151 memprintf(err, "map: cannot parse default ip <%s>.",
152 arg[1].data.str.area);
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200153 return 0;
154 }
Christopher Faulet6ad7df42020-08-07 11:45:18 +0200155 chunk_destroy(&arg[1].data.str);
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200156 if (data.type == SMP_T_IPV4) {
157 arg[1].type = ARGT_IPV4;
158 arg[1].data.ipv4 = data.u.ipv4;
159 } else {
160 arg[1].type = ARGT_IPV6;
161 arg[1].data.ipv6 = data.u.ipv6;
162 }
163 }
164
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100165 /* replace the first argument by this definition */
Christopher Faulet6ad7df42020-08-07 11:45:18 +0200166 chunk_destroy(&arg[0].data.str);
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100167 arg[0].type = ARGT_MAP;
168 arg[0].data.map = desc;
169
170 return 1;
171}
172
Thierry FOURNIER0a9a2b82015-05-11 15:20:49 +0200173static int sample_conv_map(const struct arg *arg_p, struct sample *smp, void *private)
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100174{
175 struct map_descriptor *desc;
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100176 struct pattern *pat;
Willy Tarreau83061a82018-07-13 11:56:34 +0200177 struct buffer *str;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100178
179 /* get config */
180 desc = arg_p[0].data.map;
181
182 /* Execute the match function. */
Thierry FOURNIER1e00d382014-02-11 11:31:40 +0100183 pat = pattern_exec_match(&desc->pat, smp, 1);
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100184
185 /* Match case. */
186 if (pat) {
Thierry FOURNIER503bb092015-08-19 08:35:43 +0200187 if (pat->data) {
Thierry Fournier8feaa662016-02-10 22:55:20 +0100188 /* In the regm case, merge the sample with the input. */
189 if ((long)private == PAT_MATCH_REGM) {
Emeric Brun27102212018-07-17 09:47:07 -0400190 struct buffer *tmptrash;
Willy Tarreau2842e052018-08-22 04:55:43 +0200191 int len;
Emeric Brun27102212018-07-17 09:47:07 -0400192
193 /* Copy the content of the sample because it could
194 be scratched by incoming get_trash_chunk */
195 tmptrash = alloc_trash_chunk();
196 if (!tmptrash)
197 return 0;
198
199 tmptrash->data = smp->data.u.str.data;
200 if (tmptrash->data > (tmptrash->size-1))
201 tmptrash->data = tmptrash->size-1;
202
203 memcpy(tmptrash->area, smp->data.u.str.area, tmptrash->data);
204 tmptrash->area[tmptrash->data] = 0;
205
Thierry Fournier8feaa662016-02-10 22:55:20 +0100206 str = get_trash_chunk();
Willy Tarreau2842e052018-08-22 04:55:43 +0200207 len = exp_replace(str->area, str->size,
208 tmptrash->area,
209 pat->data->u.str.area,
210 (regmatch_t *)smp->ctx.a[0]);
Nenad Merdanovic646b7742019-04-12 22:54:28 +0200211 free_trash_chunk(tmptrash);
212
Willy Tarreau2842e052018-08-22 04:55:43 +0200213 if (len == -1)
Thierry Fournier8feaa662016-02-10 22:55:20 +0100214 return 0;
Willy Tarreau2842e052018-08-22 04:55:43 +0200215
216 str->data = len;
Thierry Fournier8feaa662016-02-10 22:55:20 +0100217 smp->data.u.str = *str;
218 return 1;
219 }
220 /* Copy sample. */
Thierry FOURNIER5cc18d42015-08-19 09:02:36 +0200221 smp->data = *pat->data;
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100222 smp->flags |= SMP_F_CONST;
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100223 return 1;
224 }
225
226 /* Return just int sample containing 1. */
Thierry FOURNIER8c542ca2015-08-19 09:00:18 +0200227 smp->data.type = SMP_T_SINT;
Thierry FOURNIER136f9d32015-08-19 09:07:19 +0200228 smp->data.u.sint = 1;
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100229 return 1;
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100230 }
231
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800232 /* If no default value available, the converter fails. */
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100233 if (arg_p[1].type == ARGT_STOP)
Thierry FOURNIER1794fdf2014-01-17 15:25:13 +0100234 return 0;
235
236 /* Return the default value. */
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100237 switch (desc->conv->out_type) {
238
239 case SMP_T_STR:
Thierry FOURNIER8c542ca2015-08-19 09:00:18 +0200240 smp->data.type = SMP_T_STR;
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100241 smp->flags |= SMP_F_CONST;
Thierry FOURNIER136f9d32015-08-19 09:07:19 +0200242 smp->data.u.str = arg_p[1].data.str;
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100243 break;
244
Thierry FOURNIER07ee64e2015-07-06 23:43:03 +0200245 case SMP_T_SINT:
Thierry FOURNIER8c542ca2015-08-19 09:00:18 +0200246 smp->data.type = SMP_T_SINT;
Thierry FOURNIER136f9d32015-08-19 09:07:19 +0200247 smp->data.u.sint = arg_p[1].data.sint;
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100248 break;
249
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +0200250 case SMP_T_ADDR:
251 if (arg_p[1].type == ARGT_IPV4) {
252 smp->data.type = SMP_T_IPV4;
253 smp->data.u.ipv4 = arg_p[1].data.ipv4;
254 } else {
255 smp->data.type = SMP_T_IPV6;
256 smp->data.u.ipv6 = arg_p[1].data.ipv6;
257 }
Thierry FOURNIER933e5de2015-03-13 00:10:16 +0100258 break;
259 }
260
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +0100261 return 1;
262}
263
William Lallemandad8be612016-11-18 19:26:17 +0100264/* This function is used with map and acl management. It permits to browse
265 * each reference. The variable <getnext> must contain the current node,
266 * <end> point to the root node and the <flags> permit to filter required
267 * nodes.
268 */
269static inline
270struct pat_ref *pat_list_get_next(struct pat_ref *getnext, struct list *end,
271 unsigned int flags)
272{
273 struct pat_ref *ref = getnext;
274
275 while (1) {
276
277 /* Get next list entry. */
278 ref = LIST_NEXT(&ref->list, struct pat_ref *, list);
279
280 /* If the entry is the last of the list, return NULL. */
281 if (&ref->list == end)
282 return NULL;
283
284 /* If the entry match the flag, return it. */
285 if (ref->flags & flags)
286 return ref;
287 }
288}
289
290static inline
291struct pat_ref *pat_ref_lookup_ref(const char *reference)
292{
293 int id;
294 char *error;
295
296 /* If the reference starts by a '#', this is numeric id. */
297 if (reference[0] == '#') {
298 /* Try to convert the numeric id. If the conversion fails, the lookup fails. */
299 id = strtol(reference + 1, &error, 10);
300 if (*error != '\0')
301 return NULL;
302
303 /* Perform the unique id lookup. */
304 return pat_ref_lookupid(id);
305 }
306
307 /* Perform the string lookup. */
308 return pat_ref_lookup(reference);
309}
310
311/* This function is used with map and acl management. It permits to browse
312 * each reference.
313 */
314static inline
315struct pattern_expr *pat_expr_get_next(struct pattern_expr *getnext, struct list *end)
316{
317 struct pattern_expr *expr;
318 expr = LIST_NEXT(&getnext->list, struct pattern_expr *, list);
319 if (&expr->list == end)
320 return NULL;
321 return expr;
322}
323
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200324/* appctx context for the "{show|get|add|del|*} {map|acl}" commands. This is
325 * used even by commands that only have a parser and no I/O handler because
326 * it provides a unified way to manipulate some fields and will allow to
327 * expand some of them more easily later if needed.
328 */
329struct show_map_ctx {
330 struct pat_ref *ref;
331 struct bref bref; /* back-reference from the pat_ref_elt being dumped */
332 struct pattern_expr *expr;
333 struct buffer chunk;
334 unsigned int display_flags;
Willy Tarreau76f771e2022-05-03 14:12:56 +0200335 unsigned int curr_gen; /* current/latest generation, for show/clear */
336 unsigned int prev_gen; /* prev generation, for clear */
Willy Tarreaua0d62802022-05-03 15:12:21 +0200337 enum {
338 STATE_INIT = 0, /* initialize list and backrefs */
339 STATE_LIST, /* list entries */
340 STATE_DONE, /* finished */
341 } state; /* state of the dump */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200342};
343
Willy Tarreau76f771e2022-05-03 14:12:56 +0200344/* expects the current generation ID in ctx->curr_gen */
William Lallemandad8be612016-11-18 19:26:17 +0100345static int cli_io_handler_pat_list(struct appctx *appctx)
346{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200347 struct show_map_ctx *ctx = appctx->svcctx;
Willy Tarreauc12b3212022-05-27 11:08:15 +0200348 struct stconn *sc = appctx_sc(appctx);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200349 struct pat_ref_elt *elt;
350
Christopher Faulet87633c32023-04-03 18:32:50 +0200351 /* FIXME: Don't watch the other side !*/
Christopher Faulet208c7122023-04-13 16:16:15 +0200352 if (unlikely(sc_opposite(sc)->flags & SC_FL_SHUT_DONE)) {
Emeric Brun8d85aa42017-06-29 15:40:33 +0200353 /* If we're forced to shut down, we might have to remove our
354 * reference to the last ref_elt being dumped.
355 */
Willy Tarreauc7e97062022-05-03 15:42:07 +0200356 if (!LIST_ISEMPTY(&ctx->bref.users)) {
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200357 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreauc7e97062022-05-03 15:42:07 +0200358 LIST_DEL_INIT(&ctx->bref.users);
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200359 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200360 }
361 return 1;
362 }
William Lallemandad8be612016-11-18 19:26:17 +0100363
Willy Tarreaua0d62802022-05-03 15:12:21 +0200364 switch (ctx->state) {
365 case STATE_INIT:
366 ctx->state = STATE_LIST;
Willy Tarreauab42dc32022-11-14 07:35:24 +0100367 __fallthrough;
William Lallemandad8be612016-11-18 19:26:17 +0100368
Willy Tarreaua0d62802022-05-03 15:12:21 +0200369 case STATE_LIST:
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200370 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
Emeric Brunb5997f72017-07-03 11:34:05 +0200371
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200372 if (!LIST_ISEMPTY(&ctx->bref.users)) {
373 LIST_DELETE(&ctx->bref.users);
374 LIST_INIT(&ctx->bref.users);
Willy Tarreau1ae0c432022-05-03 15:26:27 +0200375 } else {
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200376 ctx->bref.ref = ctx->ref->head.n;
Emeric Brun8d85aa42017-06-29 15:40:33 +0200377 }
378
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200379 while (ctx->bref.ref != &ctx->ref->head) {
William Lallemandad8be612016-11-18 19:26:17 +0100380 chunk_reset(&trash);
381
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200382 elt = LIST_ELEM(ctx->bref.ref, struct pat_ref_elt *, list);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200383
Willy Tarreau76f771e2022-05-03 14:12:56 +0200384 if (elt->gen_id != ctx->curr_gen)
Willy Tarreauc93da692020-10-29 09:41:34 +0100385 goto skip;
386
William Lallemandad8be612016-11-18 19:26:17 +0100387 /* build messages */
Emeric Brun8d85aa42017-06-29 15:40:33 +0200388 if (elt->sample)
William Lallemandad8be612016-11-18 19:26:17 +0100389 chunk_appendf(&trash, "%p %s %s\n",
Emeric Brun8d85aa42017-06-29 15:40:33 +0200390 elt, elt->pattern,
391 elt->sample);
William Lallemandad8be612016-11-18 19:26:17 +0100392 else
393 chunk_appendf(&trash, "%p %s\n",
Emeric Brun8d85aa42017-06-29 15:40:33 +0200394 elt, elt->pattern);
William Lallemandad8be612016-11-18 19:26:17 +0100395
Willy Tarreaud0a06d52022-05-18 15:07:19 +0200396 if (applet_putchk(appctx, &trash) == -1) {
William Lallemandad8be612016-11-18 19:26:17 +0100397 /* let's try again later from this stream. We add ourselves into
398 * this stream's users so that it can remove us upon termination.
399 */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200400 LIST_APPEND(&elt->back_refs, &ctx->bref.users);
401 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100402 return 0;
403 }
Willy Tarreauc93da692020-10-29 09:41:34 +0100404 skip:
William Lallemandad8be612016-11-18 19:26:17 +0100405 /* get next list entry and check the end of the list */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200406 ctx->bref.ref = elt->list.n;
William Lallemandad8be612016-11-18 19:26:17 +0100407 }
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200408 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreauab42dc32022-11-14 07:35:24 +0100409 __fallthrough;
William Lallemandad8be612016-11-18 19:26:17 +0100410
411 default:
Willy Tarreaua0d62802022-05-03 15:12:21 +0200412 ctx->state = STATE_DONE;
William Lallemandad8be612016-11-18 19:26:17 +0100413 return 1;
414 }
415}
416
417static int cli_io_handler_pats_list(struct appctx *appctx)
418{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200419 struct show_map_ctx *ctx = appctx->svcctx;
William Lallemandad8be612016-11-18 19:26:17 +0100420
Willy Tarreaua0d62802022-05-03 15:12:21 +0200421 switch (ctx->state) {
422 case STATE_INIT:
William Lallemandad8be612016-11-18 19:26:17 +0100423 /* Display the column headers. If the message cannot be sent,
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800424 * quit the function with returning 0. The function is called
Willy Tarreaua0d62802022-05-03 15:12:21 +0200425 * later and restarted at the state "STATE_INIT".
William Lallemandad8be612016-11-18 19:26:17 +0100426 */
427 chunk_reset(&trash);
428 chunk_appendf(&trash, "# id (file) description\n");
Willy Tarreaud0a06d52022-05-18 15:07:19 +0200429 if (applet_putchk(appctx, &trash) == -1)
William Lallemandad8be612016-11-18 19:26:17 +0100430 return 0;
William Lallemandad8be612016-11-18 19:26:17 +0100431
432 /* Now, we start the browsing of the references lists.
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800433 * Note that the following call to LIST_ELEM returns a bad pointer. The only
William Lallemandad8be612016-11-18 19:26:17 +0100434 * available field of this pointer is <list>. It is used with the function
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800435 * pat_list_get_next() for returning the first available entry
William Lallemandad8be612016-11-18 19:26:17 +0100436 */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200437 ctx->ref = LIST_ELEM(&pattern_reference, struct pat_ref *, list);
438 ctx->ref = pat_list_get_next(ctx->ref, &pattern_reference,
439 ctx->display_flags);
Willy Tarreaua0d62802022-05-03 15:12:21 +0200440 ctx->state = STATE_LIST;
Willy Tarreauab42dc32022-11-14 07:35:24 +0100441 __fallthrough;
William Lallemandad8be612016-11-18 19:26:17 +0100442
Willy Tarreaua0d62802022-05-03 15:12:21 +0200443 case STATE_LIST:
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200444 while (ctx->ref) {
William Lallemandad8be612016-11-18 19:26:17 +0100445 chunk_reset(&trash);
446
447 /* Build messages. If the reference is used by another category than
Joseph Herlantf43b88b2018-11-25 11:48:18 -0800448 * the listed categories, display the information in the message.
William Lallemandad8be612016-11-18 19:26:17 +0100449 */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200450 chunk_appendf(&trash, "%d (%s) %s. curr_ver=%u next_ver=%u entry_cnt=%llu\n", ctx->ref->unique_id,
451 ctx->ref->reference ? ctx->ref->reference : "",
452 ctx->ref->display, ctx->ref->curr_gen, ctx->ref->next_gen,
453 ctx->ref->entry_cnt);
William Lallemandad8be612016-11-18 19:26:17 +0100454
Willy Tarreaud0a06d52022-05-18 15:07:19 +0200455 if (applet_putchk(appctx, &trash) == -1) {
William Lallemandad8be612016-11-18 19:26:17 +0100456 /* let's try again later from this stream. We add ourselves into
457 * this stream's users so that it can remove us upon termination.
458 */
William Lallemandad8be612016-11-18 19:26:17 +0100459 return 0;
460 }
461
462 /* get next list entry and check the end of the list */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200463 ctx->ref = pat_list_get_next(ctx->ref, &pattern_reference,
464 ctx->display_flags);
William Lallemandad8be612016-11-18 19:26:17 +0100465 }
466
Willy Tarreauab42dc32022-11-14 07:35:24 +0100467 __fallthrough;
William Lallemandad8be612016-11-18 19:26:17 +0100468
469 default:
Willy Tarreaua0d62802022-05-03 15:12:21 +0200470 ctx->state = STATE_DONE;
William Lallemandad8be612016-11-18 19:26:17 +0100471 return 1;
472 }
473 return 0;
474}
475
476static int cli_io_handler_map_lookup(struct appctx *appctx)
477{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200478 struct show_map_ctx *ctx = appctx->svcctx;
William Lallemandad8be612016-11-18 19:26:17 +0100479 struct sample sample;
480 struct pattern *pat;
481 int match_method;
482
Willy Tarreaua0d62802022-05-03 15:12:21 +0200483 switch (ctx->state) {
484 case STATE_INIT:
William Lallemandad8be612016-11-18 19:26:17 +0100485 /* Init to the first entry. The list cannot be change */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200486 ctx->expr = LIST_ELEM(&ctx->ref->pat, struct pattern_expr *, list);
487 ctx->expr = pat_expr_get_next(ctx->expr, &ctx->ref->pat);
Willy Tarreaua0d62802022-05-03 15:12:21 +0200488 ctx->state = STATE_LIST;
Willy Tarreauab42dc32022-11-14 07:35:24 +0100489 __fallthrough;
William Lallemandad8be612016-11-18 19:26:17 +0100490
Willy Tarreaua0d62802022-05-03 15:12:21 +0200491 case STATE_LIST:
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200492 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100493 /* for each lookup type */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200494 while (ctx->expr) {
William Lallemandad8be612016-11-18 19:26:17 +0100495 /* initialise chunk to build new message */
496 chunk_reset(&trash);
497
498 /* execute pattern matching */
499 sample.data.type = SMP_T_STR;
500 sample.flags = SMP_F_CONST;
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200501 sample.data.u.str.data = ctx->chunk.data;
502 sample.data.u.str.area = ctx->chunk.area;
Emeric Brunb5997f72017-07-03 11:34:05 +0200503
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200504 if (ctx->expr->pat_head->match &&
505 sample_convert(&sample, ctx->expr->pat_head->expect_type))
506 pat = ctx->expr->pat_head->match(&sample, ctx->expr, 1);
William Lallemandad8be612016-11-18 19:26:17 +0100507 else
508 pat = NULL;
509
510 /* build return message: set type of match */
511 for (match_method=0; match_method<PAT_MATCH_NUM; match_method++)
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200512 if (ctx->expr->pat_head->match == pat_match_fcts[match_method])
William Lallemandad8be612016-11-18 19:26:17 +0100513 break;
514 if (match_method >= PAT_MATCH_NUM)
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200515 chunk_appendf(&trash, "type=unknown(%p)", ctx->expr->pat_head->match);
William Lallemandad8be612016-11-18 19:26:17 +0100516 else
517 chunk_appendf(&trash, "type=%s", pat_match_names[match_method]);
518
519 /* case sensitive */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200520 if (ctx->expr->mflags & PAT_MF_IGNORE_CASE)
William Lallemandad8be612016-11-18 19:26:17 +0100521 chunk_appendf(&trash, ", case=insensitive");
522 else
523 chunk_appendf(&trash, ", case=sensitive");
524
525 /* Display no match, and set default value */
526 if (!pat) {
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200527 if (ctx->display_flags == PAT_REF_MAP)
William Lallemandad8be612016-11-18 19:26:17 +0100528 chunk_appendf(&trash, ", found=no");
529 else
530 chunk_appendf(&trash, ", match=no");
531 }
532
533 /* Display match and match info */
534 else {
535 /* display match */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200536 if (ctx->display_flags == PAT_REF_MAP)
William Lallemandad8be612016-11-18 19:26:17 +0100537 chunk_appendf(&trash, ", found=yes");
538 else
539 chunk_appendf(&trash, ", match=yes");
540
541 /* display index mode */
542 if (pat->sflags & PAT_SF_TREE)
543 chunk_appendf(&trash, ", idx=tree");
544 else
545 chunk_appendf(&trash, ", idx=list");
546
547 /* display pattern */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200548 if (ctx->display_flags == PAT_REF_MAP) {
William Lallemandad8be612016-11-18 19:26:17 +0100549 if (pat->ref && pat->ref->pattern)
550 chunk_appendf(&trash, ", key=\"%s\"", pat->ref->pattern);
551 else
552 chunk_appendf(&trash, ", key=unknown");
553 }
554 else {
555 if (pat->ref && pat->ref->pattern)
556 chunk_appendf(&trash, ", pattern=\"%s\"", pat->ref->pattern);
557 else
558 chunk_appendf(&trash, ", pattern=unknown");
559 }
560
561 /* display return value */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200562 if (ctx->display_flags == PAT_REF_MAP) {
William Lallemandad8be612016-11-18 19:26:17 +0100563 if (pat->data && pat->ref && pat->ref->sample)
564 chunk_appendf(&trash, ", value=\"%s\", type=\"%s\"", pat->ref->sample,
565 smp_to_type[pat->data->type]);
566 else
567 chunk_appendf(&trash, ", value=none");
568 }
569 }
570
571 chunk_appendf(&trash, "\n");
572
573 /* display response */
Willy Tarreaud0a06d52022-05-18 15:07:19 +0200574 if (applet_putchk(appctx, &trash) == -1) {
William Lallemandad8be612016-11-18 19:26:17 +0100575 /* let's try again later from this stream. We add ourselves into
576 * this stream's users so that it can remove us upon termination.
577 */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200578 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100579 return 0;
580 }
581
582 /* get next entry */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200583 ctx->expr = pat_expr_get_next(ctx->expr,
584 &ctx->ref->pat);
William Lallemandad8be612016-11-18 19:26:17 +0100585 }
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200586 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreauab42dc32022-11-14 07:35:24 +0100587 __fallthrough;
William Lallemandad8be612016-11-18 19:26:17 +0100588
589 default:
Willy Tarreaua0d62802022-05-03 15:12:21 +0200590 ctx->state = STATE_DONE;
William Lallemandad8be612016-11-18 19:26:17 +0100591 return 1;
592 }
593}
594
595static void cli_release_mlook(struct appctx *appctx)
596{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200597 struct show_map_ctx *ctx = appctx->svcctx;
598
599 ha_free(&ctx->chunk.area);
William Lallemandad8be612016-11-18 19:26:17 +0100600}
601
602
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200603static int cli_parse_get_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100604{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200605 struct show_map_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
606
William Lallemandad8be612016-11-18 19:26:17 +0100607 if (strcmp(args[1], "map") == 0 || strcmp(args[1], "acl") == 0) {
608 /* Set flags. */
609 if (args[1][0] == 'm')
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200610 ctx->display_flags = PAT_REF_MAP;
William Lallemandad8be612016-11-18 19:26:17 +0100611 else
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200612 ctx->display_flags = PAT_REF_ACL;
William Lallemandad8be612016-11-18 19:26:17 +0100613
614 /* No parameter. */
615 if (!*args[2] || !*args[3]) {
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200616 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau9d008692019-08-09 11:21:01 +0200617 return cli_err(appctx, "Missing map identifier and/or key.\n");
618 else
619 return cli_err(appctx, "Missing ACL identifier and/or key.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100620 }
621
622 /* lookup into the maps */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200623 ctx->ref = pat_ref_lookup_ref(args[2]);
624 if (!ctx->ref) {
625 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau9d008692019-08-09 11:21:01 +0200626 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
627 else
628 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100629 }
630
631 /* copy input string. The string must be allocated because
632 * it may be used over multiple iterations. It's released
633 * at the end and upon abort anyway.
634 */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200635 ctx->chunk.data = strlen(args[3]);
636 ctx->chunk.size = ctx->chunk.data + 1;
637 ctx->chunk.area = strdup(args[3]);
638 if (!ctx->chunk.area)
Willy Tarreau9d008692019-08-09 11:21:01 +0200639 return cli_err(appctx, "Out of memory error.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100640
641 return 0;
642 }
643 return 1;
644}
645
Willy Tarreau97218ce2021-04-30 14:57:03 +0200646static int cli_parse_prepare_map(char **args, char *payload, struct appctx *appctx, void *private)
647{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200648 struct show_map_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
649
Willy Tarreau97218ce2021-04-30 14:57:03 +0200650 if (strcmp(args[1], "map") == 0 ||
651 strcmp(args[1], "acl") == 0) {
652 uint next_gen;
653 char *msg = NULL;
654
655 /* Set ACL or MAP flags. */
656 if (args[1][0] == 'm')
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200657 ctx->display_flags = PAT_REF_MAP;
Willy Tarreau97218ce2021-04-30 14:57:03 +0200658 else
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200659 ctx->display_flags = PAT_REF_ACL;
Willy Tarreau97218ce2021-04-30 14:57:03 +0200660
661 /* lookup into the refs and check the map flag */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200662 ctx->ref = pat_ref_lookup_ref(args[2]);
663 if (!ctx->ref ||
664 !(ctx->ref->flags & ctx->display_flags)) {
665 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau97218ce2021-04-30 14:57:03 +0200666 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
667 else
668 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
669 }
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200670 next_gen = pat_ref_newgen(ctx->ref);
Willy Tarreau97218ce2021-04-30 14:57:03 +0200671 return cli_dynmsg(appctx, LOG_INFO, memprintf(&msg, "New version created: %u\n", next_gen));
672 }
673
674 return 0;
675}
676
Emeric Brun8d85aa42017-06-29 15:40:33 +0200677static void cli_release_show_map(struct appctx *appctx)
678{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200679 struct show_map_ctx *ctx = appctx->svcctx;
680
Willy Tarreauc7e97062022-05-03 15:42:07 +0200681 if (!LIST_ISEMPTY(&ctx->bref.users)) {
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200682 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreauc7e97062022-05-03 15:42:07 +0200683 LIST_DEL_INIT(&ctx->bref.users);
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200684 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Emeric Brun8d85aa42017-06-29 15:40:33 +0200685 }
686}
687
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200688static int cli_parse_show_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100689{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200690 struct show_map_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
691
William Lallemandad8be612016-11-18 19:26:17 +0100692 if (strcmp(args[1], "map") == 0 ||
693 strcmp(args[1], "acl") == 0) {
Willy Tarreau95f753e2021-04-30 12:09:54 +0200694 const char *gen = NULL;
William Lallemandad8be612016-11-18 19:26:17 +0100695
696 /* Set ACL or MAP flags. */
697 if (args[1][0] == 'm')
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200698 ctx->display_flags = PAT_REF_MAP;
William Lallemandad8be612016-11-18 19:26:17 +0100699 else
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200700 ctx->display_flags = PAT_REF_ACL;
William Lallemandad8be612016-11-18 19:26:17 +0100701
702 /* no parameter: display all map available */
703 if (!*args[2]) {
William Lallemandad8be612016-11-18 19:26:17 +0100704 appctx->io_handler = cli_io_handler_pats_list;
705 return 0;
706 }
707
Willy Tarreau95f753e2021-04-30 12:09:54 +0200708 /* For both "map" and "acl" we may have an optional generation
709 * number specified using a "@" character before the pattern
710 * file name.
711 */
712 if (*args[2] == '@') {
713 gen = args[2] + 1;
714 args++;
715 }
716
William Lallemandad8be612016-11-18 19:26:17 +0100717 /* lookup into the refs and check the map flag */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200718 ctx->ref = pat_ref_lookup_ref(args[2]);
719 if (!ctx->ref ||
720 !(ctx->ref->flags & ctx->display_flags)) {
721 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau9d008692019-08-09 11:21:01 +0200722 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
723 else
724 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100725 }
Willy Tarreau95f753e2021-04-30 12:09:54 +0200726
Willy Tarreau76f771e2022-05-03 14:12:56 +0200727 /* set the desired generation id in curr_gen */
Willy Tarreau95f753e2021-04-30 12:09:54 +0200728 if (gen)
Willy Tarreau76f771e2022-05-03 14:12:56 +0200729 ctx->curr_gen = str2uic(gen);
Willy Tarreau95f753e2021-04-30 12:09:54 +0200730 else
Willy Tarreau76f771e2022-05-03 14:12:56 +0200731 ctx->curr_gen = ctx->ref->curr_gen;
Willy Tarreau95f753e2021-04-30 12:09:54 +0200732
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200733 LIST_INIT(&ctx->bref.users);
William Lallemandad8be612016-11-18 19:26:17 +0100734 appctx->io_handler = cli_io_handler_pat_list;
Emeric Brun8d85aa42017-06-29 15:40:33 +0200735 appctx->io_release = cli_release_show_map;
William Lallemandad8be612016-11-18 19:26:17 +0100736 return 0;
737 }
738
739 return 0;
740}
741
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200742static int cli_parse_set_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100743{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200744 struct show_map_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
745
William Lallemandad8be612016-11-18 19:26:17 +0100746 if (strcmp(args[1], "map") == 0) {
747 char *err;
748
749 /* Set flags. */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200750 ctx->display_flags = PAT_REF_MAP;
William Lallemandad8be612016-11-18 19:26:17 +0100751
752 /* Expect three parameters: map name, key and new value. */
Willy Tarreau9d008692019-08-09 11:21:01 +0200753 if (!*args[2] || !*args[3] || !*args[4])
754 return cli_err(appctx, "'set map' expects three parameters: map identifier, key and value.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100755
756 /* Lookup the reference in the maps. */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200757 ctx->ref = pat_ref_lookup_ref(args[2]);
758 if (!ctx->ref)
Willy Tarreau9d008692019-08-09 11:21:01 +0200759 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100760
761 /* If the entry identifier start with a '#', it is considered as
762 * pointer id
763 */
764 if (args[3][0] == '#' && args[3][1] == '0' && args[3][2] == 'x') {
765 struct pat_ref_elt *ref;
766 long long int conv;
767 char *error;
768
769 /* Convert argument to integer value. */
770 conv = strtoll(&args[3][1], &error, 16);
Willy Tarreau9d008692019-08-09 11:21:01 +0200771 if (*error != '\0')
772 return cli_err(appctx, "Malformed identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100773
774 /* Convert and check integer to pointer. */
775 ref = (struct pat_ref_elt *)(long)conv;
Willy Tarreau9d008692019-08-09 11:21:01 +0200776 if ((long long int)(long)ref != conv)
777 return cli_err(appctx, "Malformed identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100778
Aurélien Nephtali9a4da682018-04-16 19:02:42 +0200779 /* Try to modify the entry. */
William Lallemandad8be612016-11-18 19:26:17 +0100780 err = NULL;
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200781 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
782 if (!pat_ref_set_by_id(ctx->ref, ref, args[4], &err)) {
783 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreau9d008692019-08-09 11:21:01 +0200784 if (err)
785 return cli_dynerr(appctx, memprintf(&err, "%s.\n", err));
786 else
787 return cli_err(appctx, "Failed to update an entry.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100788 }
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200789 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100790 }
791 else {
792 /* Else, use the entry identifier as pattern
793 * string, and update the value.
794 */
795 err = NULL;
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200796 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
797 if (!pat_ref_set(ctx->ref, args[3], args[4], &err)) {
798 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreau9d008692019-08-09 11:21:01 +0200799 if (err)
800 return cli_dynerr(appctx, memprintf(&err, "%s.\n", err));
801 else
802 return cli_err(appctx, "Failed to update an entry.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100803 }
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200804 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100805 }
806
807 /* The set is done, send message. */
Willy Tarreau3b6e5472016-11-24 15:53:53 +0100808 appctx->st0 = CLI_ST_PROMPT;
William Lallemandad8be612016-11-18 19:26:17 +0100809 return 0;
810 }
811 return 1;
812}
813
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200814static int cli_parse_add_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100815{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200816 struct show_map_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
817
William Lallemandad8be612016-11-18 19:26:17 +0100818 if (strcmp(args[1], "map") == 0 ||
819 strcmp(args[1], "acl") == 0) {
Willy Tarreaubb51c442021-04-30 15:23:36 +0200820 const char *gen = NULL;
821 uint genid = 0;
William Lallemandad8be612016-11-18 19:26:17 +0100822 int ret;
823 char *err;
824
825 /* Set flags. */
826 if (args[1][0] == 'm')
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200827 ctx->display_flags = PAT_REF_MAP;
William Lallemandad8be612016-11-18 19:26:17 +0100828 else
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200829 ctx->display_flags = PAT_REF_ACL;
William Lallemandad8be612016-11-18 19:26:17 +0100830
Willy Tarreaubb51c442021-04-30 15:23:36 +0200831 /* For both "map" and "acl" we may have an optional generation
832 * number specified using a "@" character before the pattern
833 * file name.
834 */
835 if (*args[2] == '@') {
836 gen = args[2] + 1;
837 args++;
838 }
839
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200840 /* If the keyword is "map", we expect:
841 * - three parameters if there is no payload
842 * - one parameter if there is a payload
843 * If it is "acl", we expect only two parameters
William Lallemandad8be612016-11-18 19:26:17 +0100844 */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200845 if (ctx->display_flags == PAT_REF_MAP) {
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200846 if ((!payload && (!*args[2] || !*args[3] || !*args[4])) ||
Willy Tarreau9d008692019-08-09 11:21:01 +0200847 (payload && !*args[2]))
848 return cli_err(appctx,
849 "'add map' expects three parameters (map identifier, key and value)"
850 " or one parameter (map identifier) and a payload\n");
William Lallemandad8be612016-11-18 19:26:17 +0100851 }
Willy Tarreau9d008692019-08-09 11:21:01 +0200852 else if (!*args[2] || !*args[3])
853 return cli_err(appctx, "'add acl' expects two parameters: ACL identifier and pattern.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100854
855 /* Lookup for the reference. */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200856 ctx->ref = pat_ref_lookup_ref(args[2]);
857 if (!ctx->ref) {
858 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau9d008692019-08-09 11:21:01 +0200859 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
860 else
861 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100862 }
863
Willy Tarreaubb51c442021-04-30 15:23:36 +0200864 if (gen) {
865 genid = str2uic(gen);
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200866 if ((int)(genid - ctx->ref->next_gen) > 0) {
867 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreaubb51c442021-04-30 15:23:36 +0200868 return cli_err(appctx, "Version number in the future, please use 'prepare map' before.\n");
869 else
870 return cli_err(appctx, "Version number in the future, please use 'prepare acl' before.\n");
871 }
872 }
873
William Lallemandad8be612016-11-18 19:26:17 +0100874 /* The command "add acl" is prohibited if the reference
875 * use samples.
876 */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200877 if ((ctx->display_flags & PAT_REF_ACL) &&
878 (ctx->ref->flags & PAT_REF_SMP)) {
Willy Tarreau9d008692019-08-09 11:21:01 +0200879 return cli_err(appctx,
880 "This ACL is shared with a map containing samples. "
881 "You must use the command 'add map' to add values.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100882 }
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200883
884 /* Add value(s). If no payload is used, key and value are read
885 * from the command line and only one key is set. If a payload
886 * is passed, one key/value pair is read per line till the end
887 * of the payload is reached.
888 */
William Lallemandad8be612016-11-18 19:26:17 +0100889 err = NULL;
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200890
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200891 do {
892 char *key = args[3];
893 char *value = args[4];
894 size_t l;
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200895
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200896 if (payload) {
897 /* key and value passed as payload, one pair per line */
898 if (!*payload)
899 break;
900
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200901 key = payload;
902 l = strcspn(key, " \t");
903 payload += l;
904
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200905 if (!*payload && ctx->display_flags == PAT_REF_MAP)
Willy Tarreau9d008692019-08-09 11:21:01 +0200906 return cli_dynerr(appctx, memprintf(&err, "Missing value for key '%s'.\n", key));
907
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200908 key[l] = 0;
909 payload++;
910
911 /* value */
912 payload += strspn(payload, " \t");
913 value = payload;
914 l = strcspn(value, "\n");
915 payload += l;
916 if (*payload)
917 payload++;
918 value[l] = 0;
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200919 }
Aurélien Nephtali25650ce2018-04-18 14:04:47 +0200920
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200921 if (ctx->display_flags != PAT_REF_MAP)
Willy Tarreau4053b032021-04-29 16:55:17 +0200922 value = NULL;
923
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200924 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
925 ret = !!pat_ref_load(ctx->ref, gen ? genid : ctx->ref->curr_gen, key, value, -1, &err);
926 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreau4053b032021-04-29 16:55:17 +0200927
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200928 if (!ret) {
929 if (err)
930 return cli_dynerr(appctx, memprintf(&err, "%s.\n", err));
931 else
932 return cli_err(appctx, "Failed to add a key.\n");
Aurélien Nephtali9a4da682018-04-16 19:02:42 +0200933 }
Willy Tarreauf7dd0e82021-04-29 16:02:48 +0200934 } while (payload && *payload);
William Lallemandad8be612016-11-18 19:26:17 +0100935
936 /* The add is done, send message. */
Willy Tarreau3b6e5472016-11-24 15:53:53 +0100937 appctx->st0 = CLI_ST_PROMPT;
William Lallemandad8be612016-11-18 19:26:17 +0100938 return 1;
939 }
940
941 return 0;
942}
943
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +0200944static int cli_parse_del_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +0100945{
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200946 struct show_map_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
947
William Lallemandad8be612016-11-18 19:26:17 +0100948 if (args[1][0] == 'm')
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200949 ctx->display_flags = PAT_REF_MAP;
William Lallemandad8be612016-11-18 19:26:17 +0100950 else
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200951 ctx->display_flags = PAT_REF_ACL;
William Lallemandad8be612016-11-18 19:26:17 +0100952
953 /* Expect two parameters: map name and key. */
Willy Tarreau9d008692019-08-09 11:21:01 +0200954 if (!*args[2] || !*args[3]) {
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200955 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau9d008692019-08-09 11:21:01 +0200956 return cli_err(appctx, "This command expects two parameters: map identifier and key.\n");
957 else
958 return cli_err(appctx, "This command expects two parameters: ACL identifier and key.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100959 }
960
961 /* Lookup the reference in the maps. */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200962 ctx->ref = pat_ref_lookup_ref(args[2]);
963 if (!ctx->ref ||
964 !(ctx->ref->flags & ctx->display_flags))
Willy Tarreau9d008692019-08-09 11:21:01 +0200965 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100966
967 /* If the entry identifier start with a '#', it is considered as
968 * pointer id
969 */
970 if (args[3][0] == '#' && args[3][1] == '0' && args[3][2] == 'x') {
971 struct pat_ref_elt *ref;
972 long long int conv;
973 char *error;
974
975 /* Convert argument to integer value. */
976 conv = strtoll(&args[3][1], &error, 16);
Willy Tarreau9d008692019-08-09 11:21:01 +0200977 if (*error != '\0')
978 return cli_err(appctx, "Malformed identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100979
980 /* Convert and check integer to pointer. */
981 ref = (struct pat_ref_elt *)(long)conv;
Willy Tarreau9d008692019-08-09 11:21:01 +0200982 if ((long long int)(long)ref != conv)
983 return cli_err(appctx, "Malformed identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100984
985 /* Try to delete the entry. */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200986 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
987 if (!pat_ref_delete_by_id(ctx->ref, ref)) {
988 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100989 /* The entry is not found, send message. */
Willy Tarreau9d008692019-08-09 11:21:01 +0200990 return cli_err(appctx, "Key not found.\n");
William Lallemandad8be612016-11-18 19:26:17 +0100991 }
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200992 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +0100993 }
994 else {
995 /* Else, use the entry identifier as pattern
996 * string and try to delete the entry.
997 */
Willy Tarreau0fcecc62022-05-03 11:54:47 +0200998 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
999 if (!pat_ref_delete(ctx->ref, args[3])) {
1000 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +01001001 /* The entry is not found, send message. */
Willy Tarreau9d008692019-08-09 11:21:01 +02001002 return cli_err(appctx, "Key not found.\n");
William Lallemandad8be612016-11-18 19:26:17 +01001003 }
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001004 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
William Lallemandad8be612016-11-18 19:26:17 +01001005 }
1006
1007 /* The deletion is done, send message. */
Willy Tarreau3b6e5472016-11-24 15:53:53 +01001008 appctx->st0 = CLI_ST_PROMPT;
William Lallemandad8be612016-11-18 19:26:17 +01001009 return 1;
1010}
1011
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001012/* continue to clear a map which was started in the parser. The range of
Willy Tarreau76f771e2022-05-03 14:12:56 +02001013 * generations this applies to is taken from ctx->curr_gen for the oldest
1014 * and ctx->prev_gen for the latest.
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001015 */
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001016static int cli_io_handler_clear_map(struct appctx *appctx)
1017{
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001018 struct show_map_ctx *ctx = appctx->svcctx;
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001019 int finished;
1020
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001021 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreau76f771e2022-05-03 14:12:56 +02001022 finished = pat_ref_purge_range(ctx->ref, ctx->curr_gen, ctx->prev_gen, 100);
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001023 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001024
1025 if (!finished) {
1026 /* let's come back later */
Willy Tarreau4164eb92022-05-25 15:42:03 +02001027 applet_have_more_data(appctx);
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001028 return 0;
1029 }
Willy Tarreau88b1ec92023-11-04 07:55:37 +01001030
1031 trim_all_pools();
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001032 return 1;
1033}
1034
Willy Tarreau76f771e2022-05-03 14:12:56 +02001035/* note: sets ctx->curr_gen and ctx->prev_gen to the oldest and
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001036 * latest generations to clear, respectively, and will call the clear_map
1037 * handler.
1038 */
Aurélien Nephtaliabbf6072018-04-18 13:26:46 +02001039static int cli_parse_clear_map(char **args, char *payload, struct appctx *appctx, void *private)
William Lallemandad8be612016-11-18 19:26:17 +01001040{
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001041 struct show_map_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
1042
William Lallemandad8be612016-11-18 19:26:17 +01001043 if (strcmp(args[1], "map") == 0 || strcmp(args[1], "acl") == 0) {
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001044 const char *gen = NULL;
1045
William Lallemandad8be612016-11-18 19:26:17 +01001046 /* Set ACL or MAP flags. */
1047 if (args[1][0] == 'm')
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001048 ctx->display_flags = PAT_REF_MAP;
William Lallemandad8be612016-11-18 19:26:17 +01001049 else
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001050 ctx->display_flags = PAT_REF_ACL;
William Lallemandad8be612016-11-18 19:26:17 +01001051
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001052 /* For both "map" and "acl" we may have an optional generation
1053 * number specified using a "@" character before the pattern
1054 * file name.
1055 */
1056 if (*args[2] == '@') {
1057 gen = args[2] + 1;
1058 args++;
1059 }
1060
William Lallemandad8be612016-11-18 19:26:17 +01001061 /* no parameter */
1062 if (!*args[2]) {
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001063 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau9d008692019-08-09 11:21:01 +02001064 return cli_err(appctx, "Missing map identifier.\n");
1065 else
1066 return cli_err(appctx, "Missing ACL identifier.\n");
William Lallemandad8be612016-11-18 19:26:17 +01001067 }
1068
1069 /* lookup into the refs and check the map flag */
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001070 ctx->ref = pat_ref_lookup_ref(args[2]);
1071 if (!ctx->ref ||
1072 !(ctx->ref->flags & ctx->display_flags)) {
1073 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau9d008692019-08-09 11:21:01 +02001074 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
1075 else
1076 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
William Lallemandad8be612016-11-18 19:26:17 +01001077 }
1078
Willy Tarreau76f771e2022-05-03 14:12:56 +02001079 /* set the desired generation id in curr_gen/prev_gen */
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001080 if (gen)
Willy Tarreau76f771e2022-05-03 14:12:56 +02001081 ctx->prev_gen = ctx->curr_gen = str2uic(gen);
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001082 else
Willy Tarreau76f771e2022-05-03 14:12:56 +02001083 ctx->prev_gen = ctx->curr_gen = ctx->ref->curr_gen;
Willy Tarreauff3feeb2021-04-30 13:31:43 +02001084
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001085 /* delegate the clearing to the I/O handler which can yield */
1086 return 0;
William Lallemandad8be612016-11-18 19:26:17 +01001087 }
Willy Tarreaud1d005d2019-12-20 18:22:02 +01001088 return 1;
William Lallemandad8be612016-11-18 19:26:17 +01001089}
1090
Willy Tarreau76f771e2022-05-03 14:12:56 +02001091/* note: sets ctx->curr_gen and ctx->prev_gen to the oldest and
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001092 * latest generations to clear, respectively, and will call the clear_map
1093 * handler.
1094 */
1095static int cli_parse_commit_map(char **args, char *payload, struct appctx *appctx, void *private)
1096{
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001097 struct show_map_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
1098
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001099 if (strcmp(args[1], "map") == 0 || strcmp(args[1], "acl") == 0) {
1100 const char *gen = NULL;
1101 uint genid;
1102 uint ret;
1103
1104 /* Set ACL or MAP flags. */
1105 if (args[1][0] == 'm')
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001106 ctx->display_flags = PAT_REF_MAP;
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001107 else
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001108 ctx->display_flags = PAT_REF_ACL;
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001109
1110 if (*args[2] != '@')
1111 return cli_err(appctx, "Missing version number.\n");
1112
1113 /* The generation number is mandatory for a commit. The range
1114 * of generations that get trashed by a commit starts from the
1115 * opposite of the current one and ends at the previous one.
1116 */
1117 gen = args[2] + 1;
1118 genid = str2uic(gen);
Willy Tarreau76f771e2022-05-03 14:12:56 +02001119 ctx->prev_gen = genid - 1;
1120 ctx->curr_gen = ctx->prev_gen - ((~0U) >> 1);
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001121
1122 /* no parameter */
1123 if (!*args[3]) {
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001124 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001125 return cli_err(appctx, "Missing map identifier.\n");
1126 else
1127 return cli_err(appctx, "Missing ACL identifier.\n");
1128 }
1129
1130 /* lookup into the refs and check the map flag */
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001131 ctx->ref = pat_ref_lookup_ref(args[3]);
1132 if (!ctx->ref ||
1133 !(ctx->ref->flags & ctx->display_flags)) {
1134 if (ctx->display_flags == PAT_REF_MAP)
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001135 return cli_err(appctx, "Unknown map identifier. Please use #<id> or <file>.\n");
1136 else
1137 return cli_err(appctx, "Unknown ACL identifier. Please use #<id> or <file>.\n");
1138 }
1139
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001140 HA_SPIN_LOCK(PATREF_LOCK, &ctx->ref->lock);
1141 if (genid - (ctx->ref->curr_gen + 1) <
1142 ctx->ref->next_gen - ctx->ref->curr_gen)
1143 ret = pat_ref_commit(ctx->ref, genid);
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001144 else
1145 ret = 1;
Willy Tarreau0fcecc62022-05-03 11:54:47 +02001146 HA_SPIN_UNLOCK(PATREF_LOCK, &ctx->ref->lock);
Willy Tarreau7a562ca2021-04-30 15:10:01 +02001147
1148 if (ret != 0)
1149 return cli_err(appctx, "Version number out of range.\n");
1150
1151 /* delegate the clearing to the I/O handler which can yield */
1152 return 0;
1153 }
1154 return 1;
1155}
1156
William Lallemandad8be612016-11-18 19:26:17 +01001157/* register cli keywords */
1158
1159static struct cli_kw_list cli_kws = {{ },{
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001160 { { "add", "acl", NULL }, "add acl [@<ver>] <acl> <pattern> : add an acl entry", cli_parse_add_map, NULL },
1161 { { "clear", "acl", NULL }, "clear acl [@<ver>] <acl> : clear the contents of this acl", cli_parse_clear_map, cli_io_handler_clear_map, NULL },
1162 { { "commit","acl", NULL }, "commit acl @<ver> <acl> : commit the ACL at this version", cli_parse_commit_map, cli_io_handler_clear_map, NULL },
1163 { { "del", "acl", NULL }, "del acl <acl> [<key>|#<ref>] : delete acl entries matching <key>", cli_parse_del_map, NULL },
1164 { { "get", "acl", NULL }, "get acl <acl> <value> : report the patterns matching a sample for an ACL", cli_parse_get_map, cli_io_handler_map_lookup, cli_release_mlook },
1165 { { "prepare","acl",NULL }, "prepare acl <acl> : prepare a new version for atomic ACL replacement", cli_parse_prepare_map, NULL },
1166 { { "show", "acl", NULL }, "show acl [@<ver>] <acl>] : report available acls or dump an acl's contents", cli_parse_show_map, NULL },
1167 { { "add", "map", NULL }, "add map [@<ver>] <map> <key> <val> : add a map entry (payload supported instead of key/val)", cli_parse_add_map, NULL },
1168 { { "clear", "map", NULL }, "clear map [@<ver>] <map> : clear the contents of this map", cli_parse_clear_map, cli_io_handler_clear_map, NULL },
1169 { { "commit","map", NULL }, "commit map @<ver> <map> : commit the map at this version", cli_parse_commit_map, cli_io_handler_clear_map, NULL },
1170 { { "del", "map", NULL }, "del map <map> [<key>|#<ref>] : delete map entries matching <key>", cli_parse_del_map, NULL },
1171 { { "get", "map", NULL }, "get map <acl> <value> : report the keys and values matching a sample for a map", cli_parse_get_map, cli_io_handler_map_lookup, cli_release_mlook },
1172 { { "prepare","map",NULL }, "prepare map <acl> : prepare a new version for atomic map replacement", cli_parse_prepare_map, NULL },
1173 { { "set", "map", NULL }, "set map <map> [<key>|#<ref>] <value> : modify a map entry", cli_parse_set_map, NULL },
1174 { { "show", "map", NULL }, "show map [@ver] [map] : report available maps or dump a map's contents", cli_parse_show_map, NULL },
William Lallemandad8be612016-11-18 19:26:17 +01001175 { { NULL }, NULL, NULL, NULL }
1176}};
1177
Willy Tarreau0108d902018-11-25 19:14:37 +01001178INITCALL1(STG_REGISTER, cli_register_kw, &cli_kws);
William Lallemandad8be612016-11-18 19:26:17 +01001179
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001180/* Note: must not be declared <const> as its list will be overwritten
1181 *
1182 * For the map_*_int keywords, the output is declared as SMP_T_UINT, but the converter function
1183 * can provide SMP_T_UINT, SMP_T_SINT or SMP_T_BOOL depending on how the patterns found in the
1184 * file can be parsed.
1185 *
1186 * For the map_*_ip keyword, the output is declared as SMP_T_IPV4, but the converter function
1187 * can provide SMP_T_IPV4 or SMP_T_IPV6 depending on the patterns found in the file.
1188 *
1189 * The map_* keywords only emit strings.
1190 *
1191 * The output type is only used during the configuration parsing. It is used for detecting
1192 * compatibility problems.
1193 *
1194 * The arguments are: <file>[,<default value>]
1195 */
1196static struct sample_conv_kw_list sample_conv_kws = {ILH, {
Thierry FOURNIER1edc9712014-12-15 16:18:39 +01001197 { "map", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_STR },
1198 { "map_str", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_STR },
1199 { "map_beg", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_BEG },
1200 { "map_sub", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_SUB },
1201 { "map_dir", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_DIR },
1202 { "map_dom", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_DOM },
1203 { "map_end", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_END },
1204 { "map_reg", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_REG },
Thierry Fournier8feaa662016-02-10 22:55:20 +01001205 { "map_regm", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_STR, (void *)PAT_MATCH_REGM},
Thierry FOURNIER07ee64e2015-07-06 23:43:03 +02001206 { "map_int", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_SINT, SMP_T_STR, (void *)PAT_MATCH_INT },
Thierry FOURNIER1edc9712014-12-15 16:18:39 +01001207 { "map_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_ADDR, SMP_T_STR, (void *)PAT_MATCH_IP },
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001208
Thierry FOURNIERbf65cd42015-07-20 17:45:02 +02001209 { "map_str_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_STR },
1210 { "map_beg_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_BEG },
1211 { "map_sub_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_SUB },
1212 { "map_dir_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_DIR },
1213 { "map_dom_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_DOM },
1214 { "map_end_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_END },
1215 { "map_reg_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_STR, SMP_T_SINT, (void *)PAT_MATCH_REG },
1216 { "map_int_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_SINT, SMP_T_SINT, (void *)PAT_MATCH_INT },
1217 { "map_ip_int", sample_conv_map, ARG2(1,STR,SINT), sample_load_map, SMP_T_ADDR, SMP_T_SINT, (void *)PAT_MATCH_IP },
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001218
Thierry FOURNIERb2f8f082015-08-04 19:35:46 +02001219 { "map_str_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_STR },
1220 { "map_beg_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_BEG },
1221 { "map_sub_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_SUB },
1222 { "map_dir_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_DIR },
1223 { "map_dom_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_DOM },
1224 { "map_end_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_END },
1225 { "map_reg_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_STR, SMP_T_ADDR, (void *)PAT_MATCH_REG },
1226 { "map_int_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_SINT, SMP_T_ADDR, (void *)PAT_MATCH_INT },
1227 { "map_ip_ip", sample_conv_map, ARG2(1,STR,STR), sample_load_map, SMP_T_ADDR, SMP_T_ADDR, (void *)PAT_MATCH_IP },
Thierry FOURNIERd5f624d2013-11-26 11:52:33 +01001228
1229 { /* END */ },
1230}};
1231
Willy Tarreau0108d902018-11-25 19:14:37 +01001232INITCALL1(STG_REGISTER, sample_register_convs, &sample_conv_kws);