2006-06-25 20:48:02 -04:00
/*
* Proxy variables and functions .
*
2009-03-05 17:48:25 -05:00
* Copyright 2000 - 2009 Willy Tarreau < w @ 1 wt . eu >
2006-06-25 20:48:02 -04:00
*
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation ; either version
* 2 of the License , or ( at your option ) any later version .
*
*/
# include <unistd.h>
2007-11-30 12:38:35 -05:00
# include <string.h>
2006-06-25 20:48:02 -04:00
# include <sys/types.h>
# include <sys/socket.h>
# include <sys/stat.h>
2020-06-09 03:07:15 -04:00
# include <import/eb32tree.h>
# include <import/ebistree.h>
2021-03-24 11:13:20 -04:00
# include <haproxy/acl.h>
2020-05-27 06:58:42 -04:00
# include <haproxy/api.h>
2022-05-03 05:24:24 -04:00
# include <haproxy/applet.h>
2020-06-09 03:07:15 -04:00
# include <haproxy/capture-t.h>
2020-06-04 18:00:29 -04:00
# include <haproxy/cfgparse.h>
2020-06-04 14:19:54 -04:00
# include <haproxy/cli.h>
2020-05-27 10:10:29 -04:00
# include <haproxy/errors.h>
2020-06-09 03:07:15 -04:00
# include <haproxy/fd.h>
2020-06-04 15:29:29 -04:00
# include <haproxy/filters.h>
2020-06-04 11:05:57 -04:00
# include <haproxy/global.h>
2020-06-04 15:21:03 -04:00
# include <haproxy/http_ana.h>
2021-02-12 02:49:47 -05:00
# include <haproxy/http_htx.h>
2022-12-28 09:37:57 -05:00
# include <haproxy/http_ext.h>
2023-05-11 04:30:27 -04:00
# include <haproxy/http_rules.h>
2020-06-04 08:58:24 -04:00
# include <haproxy/listener.h>
2020-06-04 16:01:04 -04:00
# include <haproxy/log.h>
2020-06-04 05:29:21 -04:00
# include <haproxy/obj_type-t.h>
2020-06-04 12:38:21 -04:00
# include <haproxy/peers.h>
2020-06-02 03:38:52 -04:00
# include <haproxy/pool.h>
2020-10-07 10:52:43 -04:00
# include <haproxy/protocol.h>
2020-06-09 03:07:15 -04:00
# include <haproxy/proto_tcp.h>
2020-06-04 16:29:18 -04:00
# include <haproxy/proxy.h>
2022-05-27 03:25:10 -04:00
# include <haproxy/sc_strm.h>
2022-05-21 17:58:40 -04:00
# include <haproxy/quic_tp.h>
2020-06-04 17:20:13 -04:00
# include <haproxy/server-t.h>
2020-06-09 03:07:15 -04:00
# include <haproxy/signal.h>
2020-06-04 13:58:55 -04:00
# include <haproxy/stats-t.h>
2022-05-27 03:47:12 -04:00
# include <haproxy/stconn.h>
2020-06-04 17:46:14 -04:00
# include <haproxy/stream.h>
2020-06-04 11:25:40 -04:00
# include <haproxy/task.h>
2021-02-12 02:49:47 -05:00
# include <haproxy/tcpcheck.h>
2020-06-01 05:05:15 -04:00
# include <haproxy/time.h>
2021-05-08 07:02:07 -04:00
# include <haproxy/tools.h>
2006-06-25 20:48:02 -04:00
2011-07-25 10:33:49 -04:00
int listeners ; /* # of proxy listeners, set by cfgparse */
2017-11-24 10:54:05 -05:00
struct proxy * proxies_list = NULL ; /* list of all existing proxies */
2009-10-04 17:04:08 -04:00
struct eb_root used_proxy_id = EB_ROOT ; /* list of proxy IDs in use */
2014-03-15 02:22:35 -04:00
struct eb_root proxy_by_name = EB_ROOT ; /* tree of proxies sorted by name */
2021-02-12 07:52:11 -05:00
struct eb_root defproxy_by_name = EB_ROOT ; /* tree of default proxies sorted by name (dups possible) */
2010-12-12 08:00:34 -05:00
unsigned int error_snapshot_id = 0 ; /* global ID assigned to each error then incremented */
2006-06-25 20:48:02 -04:00
2022-05-05 11:00:20 -04:00
/* CLI context used during "show servers {state|conn}" */
struct show_srv_ctx {
struct proxy * px ; /* current proxy to dump or NULL */
struct server * sv ; /* current server to dump or NULL */
uint only_pxid ; /* dump only this proxy ID when explicit */
int show_conn ; /* non-zero = "conn" otherwise "state" */
2022-05-05 13:26:18 -04:00
enum {
SHOW_SRV_HEAD = 0 ,
SHOW_SRV_LIST ,
} state ;
2022-05-05 11:00:20 -04:00
} ;
2018-11-11 09:40:36 -05:00
/* proxy->options */
const struct cfg_opt cfg_opts [ ] =
{
{ " abortonclose " , PR_O_ABRT_CLOSE , PR_CAP_BE , 0 , 0 } ,
{ " allbackups " , PR_O_USE_ALL_BK , PR_CAP_BE , 0 , 0 } ,
{ " checkcache " , PR_O_CHK_CACHE , PR_CAP_BE , 0 , PR_MODE_HTTP } ,
{ " clitcpka " , PR_O_TCP_CLI_KA , PR_CAP_FE , 0 , 0 } ,
{ " contstats " , PR_O_CONTSTATS , PR_CAP_FE , 0 , 0 } ,
{ " dontlognull " , PR_O_NULLNOLOG , PR_CAP_FE , 0 , 0 } ,
{ " http-buffer-request " , PR_O_WREQ_BODY , PR_CAP_FE | PR_CAP_BE , 0 , PR_MODE_HTTP } ,
{ " http-ignore-probes " , PR_O_IGNORE_PRB , PR_CAP_FE , 0 , PR_MODE_HTTP } ,
MINOR: proxy: add option idle-close-on-response
Avoid closing idle connections if a soft stop is in progress.
By default, idle connections will be closed during a soft stop. In some
environments, a client talking to the proxy may have prepared some idle
connections in order to send requests later. If there is no proper retry
on write errors, this can result in errors while haproxy is reloading.
Even though a proper implementation should retry on connection/write
errors, this option was introduced to support back compat with haproxy <
v2.4. Indeed before v2.4, we were waiting for a last request to be able
to add a "connection: close" header and advice the client to close the
connection.
In a real life example, this behavior was seen in AWS using the ALB in
front of a haproxy. The end result was ALB sending 502 during haproxy
reloads.
This patch was tested on haproxy v2.4, with a regular reload on the
process, and a constant trend of requests coming in. Before the patch,
we see regular 502 returned to the client; when activating the option,
the 502 disappear.
This patch should help fixing github issue #1506.
In order to unblock some v2.3 to v2.4 migraton, this patch should be
backported up to v2.4 branch.
Signed-off-by: William Dauchy <wdauchy@gmail.com>
[wt: minor edits to the doc to mention other options to care about]
Signed-off-by: Willy Tarreau <w@1wt.eu>
2022-01-05 16:53:24 -05:00
{ " idle-close-on-response " , PR_O_IDLE_CLOSE_RESP , PR_CAP_FE , 0 , PR_MODE_HTTP } ,
2018-11-11 09:40:36 -05:00
{ " prefer-last-server " , PR_O_PREF_LAST , PR_CAP_BE , 0 , PR_MODE_HTTP } ,
{ " logasap " , PR_O_LOGASAP , PR_CAP_FE , 0 , 0 } ,
{ " nolinger " , PR_O_TCP_NOLING , PR_CAP_FE | PR_CAP_BE , 0 , 0 } ,
{ " persist " , PR_O_PERSIST , PR_CAP_BE , 0 , 0 } ,
{ " srvtcpka " , PR_O_TCP_SRV_KA , PR_CAP_BE , 0 , 0 } ,
2019-05-22 13:24:06 -04:00
# ifdef USE_TPROXY
2018-11-11 09:40:36 -05:00
{ " transparent " , PR_O_TRANSP , PR_CAP_BE , 0 , 0 } ,
# else
{ " transparent " , 0 , 0 , 0 , 0 } ,
# endif
{ NULL , 0 , 0 , 0 , 0 }
} ;
/* proxy->options2 */
const struct cfg_opt cfg_opts2 [ ] =
{
2019-05-22 13:24:06 -04:00
# ifdef USE_LINUX_SPLICE
2018-11-11 09:40:36 -05:00
{ " splice-request " , PR_O2_SPLIC_REQ , PR_CAP_FE | PR_CAP_BE , 0 , 0 } ,
{ " splice-response " , PR_O2_SPLIC_RTR , PR_CAP_FE | PR_CAP_BE , 0 , 0 } ,
{ " splice-auto " , PR_O2_SPLIC_AUT , PR_CAP_FE | PR_CAP_BE , 0 , 0 } ,
# else
{ " splice-request " , 0 , 0 , 0 , 0 } ,
{ " splice-response " , 0 , 0 , 0 , 0 } ,
{ " splice-auto " , 0 , 0 , 0 , 0 } ,
# endif
{ " accept-invalid-http-request " , PR_O2_REQBUG_OK , PR_CAP_FE , 0 , PR_MODE_HTTP } ,
{ " accept-invalid-http-response " , PR_O2_RSPBUG_OK , PR_CAP_BE , 0 , PR_MODE_HTTP } ,
{ " dontlog-normal " , PR_O2_NOLOGNORM , PR_CAP_FE , 0 , 0 } ,
{ " log-separate-errors " , PR_O2_LOGERRORS , PR_CAP_FE , 0 , 0 } ,
{ " log-health-checks " , PR_O2_LOGHCHKS , PR_CAP_BE , 0 , 0 } ,
{ " socket-stats " , PR_O2_SOCKSTAT , PR_CAP_FE , 0 , 0 } ,
{ " tcp-smart-accept " , PR_O2_SMARTACC , PR_CAP_FE , 0 , 0 } ,
{ " tcp-smart-connect " , PR_O2_SMARTCON , PR_CAP_BE , 0 , 0 } ,
{ " independent-streams " , PR_O2_INDEPSTR , PR_CAP_FE | PR_CAP_BE , 0 , 0 } ,
{ " http-use-proxy-header " , PR_O2_USE_PXHDR , PR_CAP_FE , 0 , PR_MODE_HTTP } ,
{ " http-pretend-keepalive " , PR_O2_FAKE_KA , PR_CAP_BE , 0 , PR_MODE_HTTP } ,
{ " http-no-delay " , PR_O2_NODELAY , PR_CAP_FE | PR_CAP_BE , 0 , PR_MODE_HTTP } ,
MEDIUM: mux-h1: Add the support of headers adjustment for bogus HTTP/1 apps
There is no standard case for HTTP header names because, as stated in the
RFC7230, they are case-insensitive. So applications must handle them in a
case-insensitive manner. But some bogus applications erroneously rely on the
case used by most browsers. This problem becomes critical with HTTP/2
because all header names must be exchanged in lowercase. And HAProxy uses the
same convention. All header names are sent in lowercase to clients and servers,
regardless of the HTTP version.
This design choice is linked to the HTX implementation. So, for previous
versions (2.0 and 1.9), a workaround is to disable the HTX mode to fall
back to the legacy HTTP mode.
Since the legacy HTTP mode was removed, some users reported interoperability
issues because their application was not able anymore to handle HTTP/1 message
received from HAProxy. So, we've decided to add a way to change the case of some
headers before sending them. It is now possible to define a "mapping" between a
lowercase header name and a version supported by the bogus application. To do
so, you must use the global directives "h1-case-adjust" and
"h1-case-adjust-file". Then options "h1-case-adjust-bogus-client" and
"h1-case-adjust-bogus-server" may be used in proxy sections to enable the
conversion. See the configuration manual for more info.
Of course, our advice is to urgently upgrade these applications for
interoperability concerns and because they may be vulnerable to various types of
content smuggling attacks. But, if your are really forced to use an unmaintained
bogus application, you may use these directive, at your own risks.
If it is relevant, this feature may be backported to 2.0.
2019-07-22 10:18:24 -04:00
2022-09-06 04:09:40 -04:00
{ " h1-case-adjust-bogus-client " , PR_O2_H1_ADJ_BUGCLI , PR_CAP_FE , 0 , 0 } ,
{ " h1-case-adjust-bogus-server " , PR_O2_H1_ADJ_BUGSRV , PR_CAP_BE , 0 , 0 } ,
2020-06-02 11:33:56 -04:00
{ " disable-h2-upgrade " , PR_O2_NO_H2_UPGRADE , PR_CAP_FE , 0 , PR_MODE_HTTP } ,
2018-11-11 09:40:36 -05:00
{ NULL , 0 , 0 , 0 }
} ;
2023-08-08 05:37:59 -04:00
/* Helper function to resolve a single sticking rule after config parsing.
* Returns 1 for success and 0 for failure
*/
int resolve_stick_rule ( struct proxy * curproxy , struct sticking_rule * mrule )
{
struct stktable * target ;
if ( mrule - > table . name )
target = stktable_find_by_name ( mrule - > table . name ) ;
else
target = curproxy - > table ;
if ( ! target ) {
ha_alert ( " Proxy '%s': unable to find stick-table '%s'. \n " ,
curproxy - > id , mrule - > table . name ? mrule - > table . name : curproxy - > id ) ;
return 0 ;
}
else if ( ! stktable_compatible_sample ( mrule - > expr , target - > type ) ) {
ha_alert ( " Proxy '%s': type of fetch not usable with type of stick-table '%s'. \n " ,
curproxy - > id , mrule - > table . name ? mrule - > table . name : curproxy - > id ) ;
return 0 ;
}
/* success */
ha_free ( & mrule - > table . name ) ;
mrule - > table . t = target ;
stktable_alloc_data_type ( target , STKTABLE_DT_SERVER_ID , NULL , NULL ) ;
stktable_alloc_data_type ( target , STKTABLE_DT_SERVER_KEY , NULL , NULL ) ;
if ( ! in_proxies_list ( target - > proxies_list , curproxy ) ) {
curproxy - > next_stkt_ref = target - > proxies_list ;
target - > proxies_list = curproxy ;
}
return 1 ;
}
2023-11-16 05:29:58 -05:00
void free_stick_rules ( struct list * rules )
2021-03-24 11:13:20 -04:00
{
struct sticking_rule * rule , * ruleb ;
list_for_each_entry_safe ( rule , ruleb , rules , list ) {
2021-04-21 01:32:39 -04:00
LIST_DELETE ( & rule - > list ) ;
2021-03-24 11:13:20 -04:00
free_acl_cond ( rule - > cond ) ;
release_sample_expr ( rule - > expr ) ;
free ( rule ) ;
}
}
2023-11-23 10:27:45 -05:00
void free_server_rules ( struct list * srules )
{
struct server_rule * srule , * sruleb ;
list_for_each_entry_safe ( srule , sruleb , srules , list ) {
LIST_DELETE ( & srule - > list ) ;
free_acl_cond ( srule - > cond ) ;
free_logformat_list ( & srule - > expr ) ;
free ( srule - > file ) ;
free ( srule ) ;
}
}
2021-03-24 11:13:20 -04:00
void free_proxy ( struct proxy * p )
{
2021-08-25 09:03:46 -04:00
struct server * s ;
2021-03-24 11:13:20 -04:00
struct cap_hdr * h , * h_next ;
struct listener * l , * l_next ;
struct bind_conf * bind_conf , * bind_back ;
struct acl_cond * cond , * condb ;
struct acl * acl , * aclb ;
struct switching_rule * rule , * ruleb ;
struct redirect_rule * rdr , * rdrb ;
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
struct logger * log , * logb ;
2021-03-24 11:13:20 -04:00
struct proxy_deinit_fct * pxdf ;
struct server_deinit_fct * srvdf ;
2021-08-20 04:16:37 -04:00
if ( ! p )
return ;
2021-03-24 11:13:20 -04:00
free ( p - > conf . file ) ;
free ( p - > id ) ;
free ( p - > cookie_name ) ;
free ( p - > cookie_domain ) ;
free ( p - > cookie_attrs ) ;
free ( p - > lbprm . arg_str ) ;
2022-04-25 04:25:34 -04:00
release_sample_expr ( p - > lbprm . expr ) ;
2021-03-24 11:13:20 -04:00
free ( p - > server_state_file_name ) ;
free ( p - > capture_name ) ;
2022-03-04 18:52:40 -05:00
istfree ( & p - > monitor_uri ) ;
2021-03-24 11:13:20 -04:00
free ( p - > rdp_cookie_name ) ;
free ( p - > invalid_rep ) ;
free ( p - > invalid_req ) ;
# if defined(CONFIG_HAP_TRANSPARENT)
free ( p - > conn_src . bind_hdr_name ) ;
# endif
if ( p - > conf . logformat_string ! = default_http_log_format & &
p - > conf . logformat_string ! = default_tcp_log_format & &
2021-07-29 03:45:52 -04:00
p - > conf . logformat_string ! = clf_http_log_format & &
2022-12-22 09:37:01 -05:00
p - > conf . logformat_string ! = default_https_log_format & &
p - > conf . logformat_string ! = httpclient_log_format )
2021-03-24 11:13:20 -04:00
free ( p - > conf . logformat_string ) ;
free ( p - > conf . lfs_file ) ;
free ( p - > conf . uniqueid_format_string ) ;
istfree ( & p - > header_unique_id ) ;
free ( p - > conf . uif_file ) ;
if ( ( p - > lbprm . algo & BE_LB_LKUP ) = = BE_LB_LKUP_MAP )
free ( p - > lbprm . map . srv ) ;
2023-09-13 05:52:31 -04:00
if ( p - > mode = = PR_MODE_SYSLOG )
free ( p - > lbprm . log . srv ) ;
2021-03-24 11:13:20 -04:00
if ( p - > conf . logformat_sd_string ! = default_rfc5424_sd_log_format )
free ( p - > conf . logformat_sd_string ) ;
free ( p - > conf . lfsd_file ) ;
2021-08-31 06:08:52 -04:00
free ( p - > conf . error_logformat_string ) ;
free ( p - > conf . elfs_file ) ;
2021-03-24 11:13:20 -04:00
list_for_each_entry_safe ( cond , condb , & p - > mon_fail_cond , list ) {
2021-04-21 01:32:39 -04:00
LIST_DELETE ( & cond - > list ) ;
2023-05-11 06:29:51 -04:00
free_acl_cond ( cond ) ;
2021-03-24 11:13:20 -04:00
}
EXTRA_COUNTERS_FREE ( p - > extra_counters_fe ) ;
EXTRA_COUNTERS_FREE ( p - > extra_counters_be ) ;
list_for_each_entry_safe ( acl , aclb , & p - > acl , list ) {
2021-04-21 01:32:39 -04:00
LIST_DELETE ( & acl - > list ) ;
2021-03-24 11:13:20 -04:00
prune_acl ( acl ) ;
free ( acl ) ;
}
2023-11-23 10:27:45 -05:00
free_server_rules ( & p - > server_rules ) ;
2021-03-24 11:13:20 -04:00
list_for_each_entry_safe ( rule , ruleb , & p - > switching_rules , list ) {
2021-04-21 01:32:39 -04:00
LIST_DELETE ( & rule - > list ) ;
2023-05-11 06:29:51 -04:00
free_acl_cond ( rule - > cond ) ;
2021-03-24 11:13:20 -04:00
free ( rule - > file ) ;
free ( rule ) ;
}
list_for_each_entry_safe ( rdr , rdrb , & p - > redirect_rules , list ) {
2021-04-21 01:32:39 -04:00
LIST_DELETE ( & rdr - > list ) ;
2023-05-11 04:30:27 -04:00
http_free_redirect_rule ( rdr ) ;
2021-03-24 11:13:20 -04:00
}
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
list_for_each_entry_safe ( log , logb , & p - > loggers , list ) {
2022-03-17 14:47:33 -04:00
LIST_DEL_INIT ( & log - > list ) ;
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
free_logger ( log ) ;
2021-03-24 11:13:20 -04:00
}
2023-11-23 11:30:10 -05:00
free_logformat_list ( & p - > logformat ) ;
free_logformat_list ( & p - > logformat_sd ) ;
free_logformat_list ( & p - > format_unique_id ) ;
free_logformat_list ( & p - > logformat_error ) ;
2021-08-31 06:08:52 -04:00
2021-03-24 11:13:20 -04:00
free_act_rules ( & p - > tcp_req . inspect_rules ) ;
free_act_rules ( & p - > tcp_rep . inspect_rules ) ;
free_act_rules ( & p - > tcp_req . l4_rules ) ;
free_act_rules ( & p - > tcp_req . l5_rules ) ;
free_act_rules ( & p - > http_req_rules ) ;
free_act_rules ( & p - > http_res_rules ) ;
free_act_rules ( & p - > http_after_res_rules ) ;
free_stick_rules ( & p - > storersp_rules ) ;
free_stick_rules ( & p - > sticking_rules ) ;
h = p - > req_cap ;
while ( h ) {
2022-04-25 08:30:58 -04:00
if ( p - > defpx & & h = = p - > defpx - > req_cap )
break ;
2021-03-24 11:13:20 -04:00
h_next = h - > next ;
free ( h - > name ) ;
pool_destroy ( h - > pool ) ;
free ( h ) ;
h = h_next ;
} /* end while(h) */
h = p - > rsp_cap ;
while ( h ) {
2022-04-25 08:30:58 -04:00
if ( p - > defpx & & h = = p - > defpx - > rsp_cap )
break ;
2021-03-24 11:13:20 -04:00
h_next = h - > next ;
free ( h - > name ) ;
pool_destroy ( h - > pool ) ;
free ( h ) ;
h = h_next ;
} /* end while(h) */
s = p - > srv ;
while ( s ) {
list_for_each_entry ( srvdf , & server_deinit_list , list )
srvdf - > fct ( s ) ;
2021-08-25 09:34:53 -04:00
s = srv_drop ( s ) ;
2021-03-24 11:13:20 -04:00
} /* end while(s) */
2023-06-01 06:07:43 -04:00
/* also free default-server parameters since some of them might have
* been dynamically allocated ( e . g . : config hints , cookies , ssl . . )
*/
srv_free_params ( & p - > defsrv ) ;
2021-03-24 11:13:20 -04:00
list_for_each_entry_safe ( l , l_next , & p - > conf . listeners , by_fe ) {
2021-04-21 01:32:39 -04:00
LIST_DELETE ( & l - > by_fe ) ;
LIST_DELETE ( & l - > by_bind ) ;
2021-03-24 11:13:20 -04:00
free ( l - > name ) ;
2022-01-25 10:21:47 -05:00
free ( l - > per_thr ) ;
2021-03-24 11:13:20 -04:00
free ( l - > counters ) ;
2023-11-21 05:10:34 -05:00
task_destroy ( l - > rx . rhttp . task ) ;
2021-03-24 11:13:20 -04:00
EXTRA_COUNTERS_FREE ( l - > extra_counters ) ;
free ( l ) ;
}
/* Release unused SSL configs. */
list_for_each_entry_safe ( bind_conf , bind_back , & p - > conf . bind , by_fe ) {
if ( bind_conf - > xprt - > destroy_bind_conf )
bind_conf - > xprt - > destroy_bind_conf ( bind_conf ) ;
free ( bind_conf - > file ) ;
free ( bind_conf - > arg ) ;
2023-06-01 04:58:44 -04:00
free ( bind_conf - > settings . interface ) ;
2021-04-21 01:32:39 -04:00
LIST_DELETE ( & bind_conf - > by_fe ) ;
2023-11-21 05:10:34 -05:00
free ( bind_conf - > rhttp_srvname ) ;
2021-03-24 11:13:20 -04:00
free ( bind_conf ) ;
}
flt_deinit ( p ) ;
list_for_each_entry ( pxdf , & proxy_deinit_list , list )
pxdf - > fct ( p ) ;
free ( p - > desc ) ;
2023-01-09 05:09:03 -05:00
http_ext_clean ( p ) ;
2021-03-24 11:13:20 -04:00
task_destroy ( p - > task ) ;
pool_destroy ( p - > req_cap_pool ) ;
pool_destroy ( p - > rsp_cap_pool ) ;
2023-11-16 10:18:14 -05:00
2023-11-16 10:17:12 -05:00
stktable_deinit ( p - > table ) ;
2023-11-16 10:18:14 -05:00
ha_free ( & p - > table ) ;
2021-03-24 11:13:20 -04:00
HA_RWLOCK_DESTROY ( & p - > lbprm . lock ) ;
HA_RWLOCK_DESTROY ( & p - > lock ) ;
2022-04-25 08:30:58 -04:00
proxy_unref_defaults ( p ) ;
2021-03-24 11:13:20 -04:00
ha_free ( & p ) ;
}
2006-12-29 08:19:17 -05:00
/*
2007-11-04 01:04:43 -05:00
* This function returns a string containing a name describing capabilities to
* report comprehensible error messages . Specifically , it will return the words
2021-02-12 03:43:33 -05:00
* " frontend " , " backend " when appropriate , " defaults " if it corresponds to a
* defaults section , or " proxy " for all other cases including the proxies
* declared in " listen " mode .
2006-12-29 08:19:17 -05:00
*/
2007-11-04 01:04:43 -05:00
const char * proxy_cap_str ( int cap )
2006-12-29 08:19:17 -05:00
{
2021-02-12 03:43:33 -05:00
if ( cap & PR_CAP_DEF )
return " defaults " ;
2007-11-04 01:04:43 -05:00
if ( ( cap & PR_CAP_LISTEN ) ! = PR_CAP_LISTEN ) {
if ( cap & PR_CAP_FE )
return " frontend " ;
else if ( cap & PR_CAP_BE )
return " backend " ;
}
return " proxy " ;
2006-12-29 08:19:17 -05:00
}
2007-11-03 18:41:58 -04:00
/*
* This function returns a string containing the mode of the proxy in a format
* suitable for error messages .
*/
const char * proxy_mode_str ( int mode ) {
if ( mode = = PR_MODE_TCP )
return " tcp " ;
else if ( mode = = PR_MODE_HTTP )
return " http " ;
2018-10-26 08:47:40 -04:00
else if ( mode = = PR_MODE_CLI )
return " cli " ;
2022-03-08 05:50:59 -05:00
else if ( mode = = PR_MODE_SYSLOG )
return " syslog " ;
else if ( mode = = PR_MODE_PEERS )
return " peers " ;
2007-11-03 18:41:58 -04:00
else
return " unknown " ;
}
2021-03-15 06:11:55 -04:00
/* try to find among known options the one that looks closest to <word> by
* counting transitions between letters , digits and other characters . Will
* return the best matching word if found , otherwise NULL . An optional array
* of extra words to compare may be passed in < extra > , but it must then be
* terminated by a NULL entry . If unused it may be NULL .
*/
const char * proxy_find_best_option ( const char * word , const char * * extra )
{
uint8_t word_sig [ 1024 ] ;
uint8_t list_sig [ 1024 ] ;
const char * best_ptr = NULL ;
int dist , best_dist = INT_MAX ;
int index ;
make_word_fingerprint ( word_sig , word ) ;
for ( index = 0 ; cfg_opts [ index ] . name ; index + + ) {
make_word_fingerprint ( list_sig , cfg_opts [ index ] . name ) ;
dist = word_fingerprint_distance ( word_sig , list_sig ) ;
if ( dist < best_dist ) {
best_dist = dist ;
best_ptr = cfg_opts [ index ] . name ;
}
}
for ( index = 0 ; cfg_opts2 [ index ] . name ; index + + ) {
make_word_fingerprint ( list_sig , cfg_opts2 [ index ] . name ) ;
dist = word_fingerprint_distance ( word_sig , list_sig ) ;
if ( dist < best_dist ) {
best_dist = dist ;
best_ptr = cfg_opts2 [ index ] . name ;
}
}
while ( extra & & * extra ) {
make_word_fingerprint ( list_sig , * extra ) ;
dist = word_fingerprint_distance ( word_sig , list_sig ) ;
if ( dist < best_dist ) {
best_dist = dist ;
best_ptr = * extra ;
}
extra + + ;
}
if ( best_dist > 2 * strlen ( word ) | | ( best_ptr & & best_dist > 2 * strlen ( best_ptr ) ) )
best_ptr = NULL ;
return best_ptr ;
}
2007-12-02 19:30:13 -05:00
/* This function parses a "timeout" statement in a proxy section. It returns
* - 1 if there is any error , 1 for a warning , otherwise zero . If it does not
2012-05-08 13:47:01 -04:00
* return zero , it will write an error or warning message into a preallocated
* buffer returned at < err > . The trailing is not be written . The function must
* be called with < args > pointing to the first command line word , with < proxy >
* pointing to the proxy being parsed , and < defpx > to the default proxy or NULL .
* As a special case for compatibility with older configs , it also accepts
* " {cli|srv|con}timeout " in args [ 0 ] .
2007-12-02 19:30:13 -05:00
*/
2008-07-09 14:34:27 -04:00
static int proxy_parse_timeout ( char * * args , int section , struct proxy * proxy ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
2012-09-18 14:02:48 -04:00
char * * err )
2007-12-02 19:30:13 -05:00
{
unsigned timeout ;
int retval , cap ;
const char * res , * name ;
2008-07-06 18:09:58 -04:00
int * tv = NULL ;
2021-03-09 03:53:46 -05:00
const int * td = NULL ;
2007-12-02 19:30:13 -05:00
retval = 0 ;
2008-07-09 14:34:27 -04:00
/* simply skip "timeout" but remain compatible with old form */
if ( strcmp ( args [ 0 ] , " timeout " ) = = 0 )
args + + ;
2007-12-02 19:30:13 -05:00
name = args [ 0 ] ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
if ( strcmp ( args [ 0 ] , " client " ) = = 0 ) {
2007-12-02 19:30:13 -05:00
name = " client " ;
2007-12-02 19:38:36 -05:00
tv = & proxy - > timeout . client ;
td = & defpx - > timeout . client ;
2007-12-02 19:30:13 -05:00
cap = PR_CAP_FE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " tarpit " ) = = 0 ) {
2007-12-02 19:30:13 -05:00
tv = & proxy - > timeout . tarpit ;
td = & defpx - > timeout . tarpit ;
2008-01-06 07:40:03 -05:00
cap = PR_CAP_FE | PR_CAP_BE ;
2023-11-17 12:03:20 -05:00
} else if ( strcmp ( args [ 0 ] , " client-hs " ) = = 0 ) {
tv = & proxy - > timeout . client_hs ;
td = & defpx - > timeout . client_hs ;
2023-11-14 12:31:38 -05:00
cap = PR_CAP_FE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " http-keep-alive " ) = = 0 ) {
2010-01-10 08:46:16 -05:00
tv = & proxy - > timeout . httpka ;
td = & defpx - > timeout . httpka ;
cap = PR_CAP_FE | PR_CAP_BE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " http-request " ) = = 0 ) {
2008-01-06 07:24:40 -05:00
tv = & proxy - > timeout . httpreq ;
td = & defpx - > timeout . httpreq ;
2009-07-12 04:03:17 -04:00
cap = PR_CAP_FE | PR_CAP_BE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " server " ) = = 0 ) {
2007-12-02 19:30:13 -05:00
name = " server " ;
2007-12-02 19:38:36 -05:00
tv = & proxy - > timeout . server ;
td = & defpx - > timeout . server ;
2007-12-02 19:30:13 -05:00
cap = PR_CAP_BE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " connect " ) = = 0 ) {
2007-12-02 19:30:13 -05:00
name = " connect " ;
2007-12-02 19:38:36 -05:00
tv = & proxy - > timeout . connect ;
td = & defpx - > timeout . connect ;
2007-12-02 19:30:13 -05:00
cap = PR_CAP_BE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " check " ) = = 0 ) {
2008-01-20 19:54:06 -05:00
tv = & proxy - > timeout . check ;
td = & defpx - > timeout . check ;
cap = PR_CAP_BE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " queue " ) = = 0 ) {
2007-12-02 19:30:13 -05:00
tv = & proxy - > timeout . queue ;
td = & defpx - > timeout . queue ;
cap = PR_CAP_BE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " tunnel " ) = = 0 ) {
2012-05-12 06:50:00 -04:00
tv = & proxy - > timeout . tunnel ;
td = & defpx - > timeout . tunnel ;
cap = PR_CAP_BE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " client-fin " ) = = 0 ) {
2014-05-10 08:30:07 -04:00
tv = & proxy - > timeout . clientfin ;
td = & defpx - > timeout . clientfin ;
cap = PR_CAP_FE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " server-fin " ) = = 0 ) {
2014-05-10 08:30:07 -04:00
tv = & proxy - > timeout . serverfin ;
td = & defpx - > timeout . serverfin ;
cap = PR_CAP_BE ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " clitimeout " ) = = 0 ) {
2019-05-14 14:57:59 -04:00
memprintf ( err , " the '%s' directive is not supported anymore since HAProxy 2.1. Use 'timeout client'. " , args [ 0 ] ) ;
return - 1 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " srvtimeout " ) = = 0 ) {
2019-05-14 14:57:59 -04:00
memprintf ( err , " the '%s' directive is not supported anymore since HAProxy 2.1. Use 'timeout server'. " , args [ 0 ] ) ;
return - 1 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " contimeout " ) = = 0 ) {
2019-05-14 14:57:59 -04:00
memprintf ( err , " the '%s' directive is not supported anymore since HAProxy 2.1. Use 'timeout connect'. " , args [ 0 ] ) ;
return - 1 ;
2007-12-02 19:30:13 -05:00
} else {
2012-05-08 13:47:01 -04:00
memprintf ( err ,
" 'timeout' supports 'client', 'server', 'connect', 'check', "
2023-11-14 12:31:38 -05:00
" 'queue', 'handshake', 'http-keep-alive', 'http-request', 'tunnel', 'tarpit', "
2014-05-10 08:30:07 -04:00
" 'client-fin' and 'server-fin' (got '%s') " ,
2012-05-08 13:47:01 -04:00
args [ 0 ] ) ;
2007-12-02 19:30:13 -05:00
return - 1 ;
}
if ( * args [ 1 ] = = 0 ) {
2012-05-08 13:47:01 -04:00
memprintf ( err , " 'timeout %s' expects an integer value (in milliseconds) " , name ) ;
2007-12-02 19:30:13 -05:00
return - 1 ;
}
res = parse_time_err ( args [ 1 ] , & timeout , TIME_UNIT_MS ) ;
2019-06-07 13:00:37 -04:00
if ( res = = PARSE_TIME_OVER ) {
memprintf ( err , " timer overflow in argument '%s' to 'timeout %s' (maximum value is 2147483647 ms or ~24.8 days) " ,
args [ 1 ] , name ) ;
return - 1 ;
}
else if ( res = = PARSE_TIME_UNDER ) {
memprintf ( err , " timer underflow in argument '%s' to 'timeout %s' (minimum non-null value is 1 ms) " ,
args [ 1 ] , name ) ;
return - 1 ;
}
else if ( res ) {
2012-05-08 13:47:01 -04:00
memprintf ( err , " unexpected character '%c' in 'timeout %s' " , * res , name ) ;
2007-12-02 19:30:13 -05:00
return - 1 ;
}
if ( ! ( proxy - > cap & cap ) ) {
2012-05-08 13:47:01 -04:00
memprintf ( err , " 'timeout %s' will be ignored because %s '%s' has no %s capability " ,
name , proxy_type_str ( proxy ) , proxy - > id ,
( cap & PR_CAP_BE ) ? " backend " : " frontend " ) ;
2007-12-02 19:30:13 -05:00
retval = 1 ;
}
2008-07-06 18:09:58 -04:00
else if ( defpx & & * tv ! = * td ) {
2012-05-08 13:47:01 -04:00
memprintf ( err , " overwriting 'timeout %s' which was already specified " , name ) ;
2007-12-02 19:30:13 -05:00
retval = 1 ;
}
2014-05-22 02:24:46 -04:00
if ( * args [ 2 ] ! = 0 ) {
memprintf ( err , " 'timeout %s' : unexpected extra argument '%s' after value '%s'. " , name , args [ 2 ] , args [ 1 ] ) ;
retval = - 1 ;
}
2008-07-06 18:09:58 -04:00
* tv = MS_TO_TICKS ( timeout ) ;
2007-12-02 19:30:13 -05:00
return retval ;
}
2009-03-05 17:48:25 -05:00
/* This function parses a "rate-limit" statement in a proxy section. It returns
* - 1 if there is any error , 1 for a warning , otherwise zero . If it does not
2012-05-08 13:47:01 -04:00
* return zero , it will write an error or warning message into a preallocated
* buffer returned at < err > . The function must be called with < args > pointing
* to the first command line word , with < proxy > pointing to the proxy being
* parsed , and < defpx > to the default proxy or NULL .
2009-03-05 17:48:25 -05:00
*/
static int proxy_parse_rate_limit ( char * * args , int section , struct proxy * proxy ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
2012-09-18 14:02:48 -04:00
char * * err )
2009-03-05 17:48:25 -05:00
{
2020-01-15 19:34:27 -05:00
int retval ;
2012-05-08 13:47:01 -04:00
char * res ;
2009-03-05 17:48:25 -05:00
unsigned int * tv = NULL ;
2021-03-09 03:53:46 -05:00
const unsigned int * td = NULL ;
2009-03-05 17:48:25 -05:00
unsigned int val ;
retval = 0 ;
2012-05-08 13:47:01 -04:00
if ( strcmp ( args [ 1 ] , " sessions " ) = = 0 ) {
2009-05-10 12:52:49 -04:00
tv = & proxy - > fe_sps_lim ;
td = & defpx - > fe_sps_lim ;
2012-05-08 13:47:01 -04:00
}
else {
memprintf ( err , " '%s' only supports 'sessions' (got '%s') " , args [ 0 ] , args [ 1 ] ) ;
2009-03-05 17:48:25 -05:00
return - 1 ;
}
2012-05-08 13:47:01 -04:00
if ( * args [ 2 ] = = 0 ) {
memprintf ( err , " '%s %s' expects expects an integer value (in sessions/second) " , args [ 0 ] , args [ 1 ] ) ;
2009-03-05 17:48:25 -05:00
return - 1 ;
}
2012-05-08 13:47:01 -04:00
val = strtoul ( args [ 2 ] , & res , 0 ) ;
2009-03-05 17:48:25 -05:00
if ( * res ) {
2012-05-08 13:47:01 -04:00
memprintf ( err , " '%s %s' : unexpected character '%c' in integer value '%s' " , args [ 0 ] , args [ 1 ] , * res , args [ 2 ] ) ;
2009-03-05 17:48:25 -05:00
return - 1 ;
}
2020-01-15 19:34:27 -05:00
if ( ! ( proxy - > cap & PR_CAP_FE ) ) {
memprintf ( err , " %s %s will be ignored because %s '%s' has no frontend capability " ,
args [ 0 ] , args [ 1 ] , proxy_type_str ( proxy ) , proxy - > id ) ;
2009-03-05 17:48:25 -05:00
retval = 1 ;
}
else if ( defpx & & * tv ! = * td ) {
2012-05-08 13:47:01 -04:00
memprintf ( err , " overwriting %s %s which was already specified " , args [ 0 ] , args [ 1 ] ) ;
2009-03-05 17:48:25 -05:00
retval = 1 ;
}
* tv = val ;
return retval ;
}
2014-04-25 07:58:37 -04:00
/* This function parses a "max-keep-alive-queue" statement in a proxy section.
* It returns - 1 if there is any error , 1 for a warning , otherwise zero . If it
* does not return zero , it will write an error or warning message into a
* preallocated buffer returned at < err > . The function must be called with
* < args > pointing to the first command line word , with < proxy > pointing to
* the proxy being parsed , and < defpx > to the default proxy or NULL .
*/
static int proxy_parse_max_ka_queue ( char * * args , int section , struct proxy * proxy ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
2014-04-25 07:58:37 -04:00
char * * err )
{
int retval ;
char * res ;
unsigned int val ;
retval = 0 ;
if ( * args [ 1 ] = = 0 ) {
memprintf ( err , " '%s' expects expects an integer value (or -1 to disable) " , args [ 0 ] ) ;
return - 1 ;
}
val = strtol ( args [ 1 ] , & res , 0 ) ;
if ( * res ) {
memprintf ( err , " '%s' : unexpected character '%c' in integer value '%s' " , args [ 0 ] , * res , args [ 1 ] ) ;
return - 1 ;
}
if ( ! ( proxy - > cap & PR_CAP_BE ) ) {
memprintf ( err , " %s will be ignored because %s '%s' has no backend capability " ,
args [ 0 ] , proxy_type_str ( proxy ) , proxy - > id ) ;
retval = 1 ;
}
/* we store <val+1> so that a user-facing value of -1 is stored as zero (default) */
proxy - > max_ka_queue = val + 1 ;
return retval ;
}
2015-05-26 11:44:32 -04:00
/* This function parses a "declare" statement in a proxy section. It returns -1
* if there is any error , 1 for warning , otherwise 0. If it does not return zero ,
* it will write an error or warning message into a preallocated buffer returned
* at < err > . The function must be called with < args > pointing to the first command
* line word , with < proxy > pointing to the proxy being parsed , and < defpx > to the
* default proxy or NULL .
*/
static int proxy_parse_declare ( char * * args , int section , struct proxy * curpx ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
2015-05-26 11:44:32 -04:00
char * * err )
{
/* Capture keyword wannot be declared in a default proxy. */
if ( curpx = = defpx ) {
2018-11-15 14:50:44 -05:00
memprintf ( err , " '%s' not available in default section " , args [ 0 ] ) ;
2015-05-26 11:44:32 -04:00
return - 1 ;
}
2021-01-07 23:35:52 -05:00
/* Capture keyword is only available in frontend. */
2015-05-26 11:44:32 -04:00
if ( ! ( curpx - > cap & PR_CAP_FE ) ) {
2018-11-15 14:50:44 -05:00
memprintf ( err , " '%s' only available in frontend or listen section " , args [ 0 ] ) ;
2015-05-26 11:44:32 -04:00
return - 1 ;
}
/* Check mandatory second keyword. */
if ( ! args [ 1 ] | | ! * args [ 1 ] ) {
memprintf ( err , " '%s' needs a second keyword that specify the type of declaration ('capture') " , args [ 0 ] ) ;
return - 1 ;
}
2018-11-15 14:46:55 -05:00
/* Actually, declare is only available for declaring capture
2015-05-26 11:44:32 -04:00
* slot , but in the future it can declare maps or variables .
2018-11-15 14:46:55 -05:00
* So , this section permits to check and switch according with
2015-05-26 11:44:32 -04:00
* the second keyword .
*/
if ( strcmp ( args [ 1 ] , " capture " ) = = 0 ) {
char * error = NULL ;
long len ;
struct cap_hdr * hdr ;
/* Check the next keyword. */
if ( ! args [ 2 ] | | ! * args [ 2 ] | |
( strcmp ( args [ 2 ] , " response " ) ! = 0 & &
strcmp ( args [ 2 ] , " request " ) ! = 0 ) ) {
memprintf ( err , " '%s %s' requires a direction ('request' or 'response') " , args [ 0 ] , args [ 1 ] ) ;
return - 1 ;
}
/* Check the 'len' keyword. */
if ( ! args [ 3 ] | | ! * args [ 3 ] | | strcmp ( args [ 3 ] , " len " ) ! = 0 ) {
memprintf ( err , " '%s %s' requires a capture length ('len') " , args [ 0 ] , args [ 1 ] ) ;
return - 1 ;
}
/* Check the length value. */
if ( ! args [ 4 ] | | ! * args [ 4 ] ) {
memprintf ( err , " '%s %s': 'len' requires a numeric value that represents the "
" capture length " ,
args [ 0 ] , args [ 1 ] ) ;
return - 1 ;
}
/* convert the length value. */
len = strtol ( args [ 4 ] , & error , 10 ) ;
if ( * error ! = ' \0 ' ) {
memprintf ( err , " '%s %s': cannot parse the length '%s'. " ,
args [ 0 ] , args [ 1 ] , args [ 3 ] ) ;
return - 1 ;
}
/* check length. */
if ( len < = 0 ) {
memprintf ( err , " length must be > 0 " ) ;
return - 1 ;
}
/* register the capture. */
2016-04-03 07:48:43 -04:00
hdr = calloc ( 1 , sizeof ( * hdr ) ) ;
2021-05-12 12:04:46 -04:00
if ( ! hdr ) {
memprintf ( err , " proxy '%s': out of memory while registering a capture " , curpx - > id ) ;
return - 1 ;
}
2015-05-26 11:44:32 -04:00
hdr - > name = NULL ; /* not a header capture */
hdr - > namelen = 0 ;
hdr - > len = len ;
hdr - > pool = create_pool ( " caphdr " , hdr - > len + 1 , MEM_F_SHARED ) ;
if ( strcmp ( args [ 2 ] , " request " ) = = 0 ) {
hdr - > next = curpx - > req_cap ;
hdr - > index = curpx - > nb_req_cap + + ;
curpx - > req_cap = hdr ;
}
if ( strcmp ( args [ 2 ] , " response " ) = = 0 ) {
hdr - > next = curpx - > rsp_cap ;
hdr - > index = curpx - > nb_rsp_cap + + ;
curpx - > rsp_cap = hdr ;
}
return 0 ;
}
else {
memprintf ( err , " unknown declaration type '%s' (supports 'capture') " , args [ 1 ] ) ;
return - 1 ;
}
}
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
/* This function parses a "retry-on" statement */
static int
proxy_parse_retry_on ( char * * args , int section , struct proxy * curpx ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
char * * err )
{
int i ;
if ( ! ( * args [ 1 ] ) ) {
memprintf ( err , " '%s' needs at least one keyword to specify when to retry " , args [ 0 ] ) ;
return - 1 ;
}
if ( ! ( curpx - > cap & PR_CAP_BE ) ) {
memprintf ( err , " '%s' only available in backend or listen section " , args [ 0 ] ) ;
return - 1 ;
}
curpx - > retry_type = 0 ;
for ( i = 1 ; * ( args [ i ] ) ; i + + ) {
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
if ( strcmp ( args [ i ] , " conn-failure " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_CONN_FAILED ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " empty-response " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_DISCONNECTED ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " response-timeout " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_TIMEOUT ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 401 " ) = = 0 )
2020-11-12 05:14:05 -05:00
curpx - > retry_type | = PR_RE_401 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 403 " ) = = 0 )
2020-11-12 05:14:05 -05:00
curpx - > retry_type | = PR_RE_403 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 404 " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_404 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 408 " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_408 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 425 " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_425 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 500 " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_500 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 501 " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_501 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 502 " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_502 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 503 " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_503 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 504 " ) = = 0 )
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
curpx - > retry_type | = PR_RE_504 ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " 0rtt-rejected " ) = = 0 )
2019-05-03 16:46:27 -04:00
curpx - > retry_type | = PR_RE_EARLY_ERROR ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " junk-response " ) = = 0 )
2019-05-03 17:01:47 -04:00
curpx - > retry_type | = PR_RE_JUNK_REQUEST ;
MINOR: streams: Introduce a new retry-on keyword, all-retryable-errors.
Add a new retry-on keyword, "all-retryable-errors", that activates retry
for all errors that are considered retryable.
This currently activates retry for "conn-failure", "empty-response",
"junk-respones", "response-timeout", "0rtt-rejected", "500", "502", "503" and
"504".
2019-05-10 12:05:40 -04:00
else if ( ! ( strcmp ( args [ i ] , " all-retryable-errors " ) ) )
curpx - > retry_type | = PR_RE_CONN_FAILED | PR_RE_DISCONNECTED |
PR_RE_TIMEOUT | PR_RE_500 | PR_RE_502 |
PR_RE_503 | PR_RE_504 | PR_RE_EARLY_ERROR |
PR_RE_JUNK_REQUEST ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
else if ( strcmp ( args [ i ] , " none " ) = = 0 ) {
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
if ( i ! = 1 | | * args [ i + 1 ] ) {
memprintf ( err , " '%s' 'none' keyworld only usable alone " , args [ 0 ] ) ;
return - 1 ;
}
} else {
memprintf ( err , " '%s': unknown keyword '%s' " , args [ 0 ] , args [ i ] ) ;
return - 1 ;
}
}
return 0 ;
}
2020-07-08 23:58:51 -04:00
# ifdef TCP_KEEPCNT
2020-07-08 22:13:20 -04:00
/* This function parses "{cli|srv}tcpka-cnt" statements */
static int proxy_parse_tcpka_cnt ( char * * args , int section , struct proxy * proxy ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
2020-07-08 22:13:20 -04:00
char * * err )
{
int retval ;
char * res ;
unsigned int tcpka_cnt ;
retval = 0 ;
if ( * args [ 1 ] = = 0 ) {
memprintf ( err , " '%s' expects an integer value " , args [ 0 ] ) ;
return - 1 ;
}
tcpka_cnt = strtol ( args [ 1 ] , & res , 0 ) ;
if ( * res ) {
memprintf ( err , " '%s' : unexpected character '%c' in integer value '%s' " , args [ 0 ] , * res , args [ 1 ] ) ;
return - 1 ;
}
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
if ( strcmp ( args [ 0 ] , " clitcpka-cnt " ) = = 0 ) {
2020-07-08 22:13:20 -04:00
if ( ! ( proxy - > cap & PR_CAP_FE ) ) {
memprintf ( err , " %s will be ignored because %s '%s' has no frontend capability " ,
args [ 0 ] , proxy_type_str ( proxy ) , proxy - > id ) ;
retval = 1 ;
}
proxy - > clitcpka_cnt = tcpka_cnt ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " srvtcpka-cnt " ) = = 0 ) {
2020-07-08 22:13:20 -04:00
if ( ! ( proxy - > cap & PR_CAP_BE ) ) {
memprintf ( err , " %s will be ignored because %s '%s' has no backend capability " ,
args [ 0 ] , proxy_type_str ( proxy ) , proxy - > id ) ;
retval = 1 ;
}
proxy - > srvtcpka_cnt = tcpka_cnt ;
} else {
/* unreachable */
memprintf ( err , " '%s': unknown keyword " , args [ 0 ] ) ;
return - 1 ;
}
return retval ;
}
2020-07-08 23:58:51 -04:00
# endif
2020-07-08 22:13:20 -04:00
2020-07-08 23:58:51 -04:00
# ifdef TCP_KEEPIDLE
2020-07-08 22:13:20 -04:00
/* This function parses "{cli|srv}tcpka-idle" statements */
static int proxy_parse_tcpka_idle ( char * * args , int section , struct proxy * proxy ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
2020-07-08 22:13:20 -04:00
char * * err )
{
int retval ;
const char * res ;
unsigned int tcpka_idle ;
retval = 0 ;
if ( * args [ 1 ] = = 0 ) {
memprintf ( err , " '%s' expects an integer value " , args [ 0 ] ) ;
return - 1 ;
}
res = parse_time_err ( args [ 1 ] , & tcpka_idle , TIME_UNIT_S ) ;
if ( res = = PARSE_TIME_OVER ) {
memprintf ( err , " timer overflow in argument '%s' to '%s' (maximum value is 2147483647 ms or ~24.8 days) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res = = PARSE_TIME_UNDER ) {
memprintf ( err , " timer underflow in argument '%s' to '%s' (minimum non-null value is 1 ms) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res ) {
memprintf ( err , " unexpected character '%c' in argument to <%s>. \n " , * res , args [ 0 ] ) ;
return - 1 ;
}
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
if ( strcmp ( args [ 0 ] , " clitcpka-idle " ) = = 0 ) {
2020-07-08 22:13:20 -04:00
if ( ! ( proxy - > cap & PR_CAP_FE ) ) {
memprintf ( err , " %s will be ignored because %s '%s' has no frontend capability " ,
args [ 0 ] , proxy_type_str ( proxy ) , proxy - > id ) ;
retval = 1 ;
}
proxy - > clitcpka_idle = tcpka_idle ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " srvtcpka-idle " ) = = 0 ) {
2020-07-08 22:13:20 -04:00
if ( ! ( proxy - > cap & PR_CAP_BE ) ) {
memprintf ( err , " %s will be ignored because %s '%s' has no backend capability " ,
args [ 0 ] , proxy_type_str ( proxy ) , proxy - > id ) ;
retval = 1 ;
}
proxy - > srvtcpka_idle = tcpka_idle ;
} else {
/* unreachable */
memprintf ( err , " '%s': unknown keyword " , args [ 0 ] ) ;
return - 1 ;
}
return retval ;
}
2020-07-08 23:58:51 -04:00
# endif
2020-07-08 22:13:20 -04:00
2020-07-08 23:58:51 -04:00
# ifdef TCP_KEEPINTVL
2020-07-08 22:13:20 -04:00
/* This function parses "{cli|srv}tcpka-intvl" statements */
static int proxy_parse_tcpka_intvl ( char * * args , int section , struct proxy * proxy ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
2020-07-08 22:13:20 -04:00
char * * err )
{
int retval ;
const char * res ;
unsigned int tcpka_intvl ;
retval = 0 ;
if ( * args [ 1 ] = = 0 ) {
memprintf ( err , " '%s' expects an integer value " , args [ 0 ] ) ;
return - 1 ;
}
res = parse_time_err ( args [ 1 ] , & tcpka_intvl , TIME_UNIT_S ) ;
if ( res = = PARSE_TIME_OVER ) {
memprintf ( err , " timer overflow in argument '%s' to '%s' (maximum value is 2147483647 ms or ~24.8 days) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res = = PARSE_TIME_UNDER ) {
memprintf ( err , " timer underflow in argument '%s' to '%s' (minimum non-null value is 1 ms) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res ) {
memprintf ( err , " unexpected character '%c' in argument to <%s>. \n " , * res , args [ 0 ] ) ;
return - 1 ;
}
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
if ( strcmp ( args [ 0 ] , " clitcpka-intvl " ) = = 0 ) {
2020-07-08 22:13:20 -04:00
if ( ! ( proxy - > cap & PR_CAP_FE ) ) {
memprintf ( err , " %s will be ignored because %s '%s' has no frontend capability " ,
args [ 0 ] , proxy_type_str ( proxy ) , proxy - > id ) ;
retval = 1 ;
}
proxy - > clitcpka_intvl = tcpka_intvl ;
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
} else if ( strcmp ( args [ 0 ] , " srvtcpka-intvl " ) = = 0 ) {
2020-07-08 22:13:20 -04:00
if ( ! ( proxy - > cap & PR_CAP_BE ) ) {
memprintf ( err , " %s will be ignored because %s '%s' has no backend capability " ,
args [ 0 ] , proxy_type_str ( proxy ) , proxy - > id ) ;
retval = 1 ;
}
proxy - > srvtcpka_intvl = tcpka_intvl ;
} else {
/* unreachable */
memprintf ( err , " '%s': unknown keyword " , args [ 0 ] ) ;
return - 1 ;
}
return retval ;
}
2020-07-08 23:58:51 -04:00
# endif
2020-07-08 22:13:20 -04:00
2021-02-12 07:52:11 -05:00
/* This function inserts proxy <px> into the tree of known proxies (regular
* ones or defaults depending on px - > cap & PR_CAP_DEF ) . The proxy ' s name is
* used as the storing key so it must already have been initialized .
2014-03-15 02:22:35 -04:00
*/
void proxy_store_name ( struct proxy * px )
{
2021-02-12 07:52:11 -05:00
struct eb_root * root = ( px - > cap & PR_CAP_DEF ) ? & defproxy_by_name : & proxy_by_name ;
2014-03-15 02:22:35 -04:00
px - > conf . by_name . key = px - > id ;
2021-02-12 07:52:11 -05:00
ebis_insert ( root , & px - > conf . by_name ) ;
2014-03-15 02:22:35 -04:00
}
2015-05-26 09:25:32 -04:00
/* Returns a pointer to the first proxy matching capabilities <cap> and id
* < id > . NULL is returned if no match is found . If < table > is non - zero , it
* only considers proxies having a table .
2011-08-02 05:25:54 -04:00
*/
2015-05-26 09:25:32 -04:00
struct proxy * proxy_find_by_id ( int id , int cap , int table )
2015-05-26 05:24:42 -04:00
{
2015-05-26 09:25:32 -04:00
struct eb32_node * n ;
2011-08-02 05:25:54 -04:00
2015-05-26 09:25:32 -04:00
for ( n = eb32_lookup ( & used_proxy_id , id ) ; n ; n = eb32_next ( n ) ) {
struct proxy * px = container_of ( n , struct proxy , conf . id ) ;
2014-03-15 02:43:51 -04:00
2015-05-26 09:25:32 -04:00
if ( px - > uuid ! = id )
break ;
2009-11-01 21:27:13 -05:00
2015-05-26 09:25:32 -04:00
if ( ( px - > cap & cap ) ! = cap )
continue ;
2014-03-15 02:43:51 -04:00
2019-03-14 02:07:41 -04:00
if ( table & & ( ! px - > table | | ! px - > table - > size ) )
2015-05-26 09:25:32 -04:00
continue ;
2014-03-15 02:43:51 -04:00
2015-05-26 09:25:32 -04:00
return px ;
}
return NULL ;
}
2014-03-15 02:43:51 -04:00
2015-05-26 09:25:32 -04:00
/* Returns a pointer to the first proxy matching either name <name>, or id
* < name > if < name > begins with a ' # ' . NULL is returned if no match is found .
2021-02-12 07:52:11 -05:00
* If < table > is non - zero , it only considers proxies having a table . The search
* is made into the regular proxies , unless < cap > has PR_CAP_DEF set in which
* case it ' s searched into the defproxy tree .
2015-05-26 09:25:32 -04:00
*/
struct proxy * proxy_find_by_name ( const char * name , int cap , int table )
{
struct proxy * curproxy ;
2015-05-26 05:24:42 -04:00
2021-02-12 07:52:11 -05:00
if ( * name = = ' # ' & & ! ( cap & PR_CAP_DEF ) ) {
2015-05-26 09:25:32 -04:00
curproxy = proxy_find_by_id ( atoi ( name + 1 ) , cap , table ) ;
if ( curproxy )
2015-05-26 05:35:41 -04:00
return curproxy ;
2009-11-01 21:27:13 -05:00
}
2014-03-15 02:43:51 -04:00
else {
2021-02-12 07:52:11 -05:00
struct eb_root * root ;
2014-03-15 02:43:51 -04:00
struct ebpt_node * node ;
2021-02-12 07:52:11 -05:00
root = ( cap & PR_CAP_DEF ) ? & defproxy_by_name : & proxy_by_name ;
for ( node = ebis_lookup ( root , name ) ; node ; node = ebpt_next ( node ) ) {
2014-03-15 02:43:51 -04:00
curproxy = container_of ( node , struct proxy , conf . by_name ) ;
if ( strcmp ( curproxy - > id , name ) ! = 0 )
break ;
if ( ( curproxy - > cap & cap ) ! = cap )
continue ;
2009-11-01 21:27:13 -05:00
2019-03-14 02:07:41 -04:00
if ( table & & ( ! curproxy - > table | | ! curproxy - > table - > size ) )
2015-05-26 05:24:42 -04:00
continue ;
2015-05-26 05:35:41 -04:00
return curproxy ;
2014-03-15 02:43:51 -04:00
}
}
2015-05-26 05:35:41 -04:00
return NULL ;
2009-11-01 21:27:13 -05:00
}
2015-05-27 10:46:26 -04:00
/* Finds the best match for a proxy with capabilities <cap>, name <name> and id
* < id > . At most one of < id > or < name > may be different provided that < cap > is
* valid . Either < id > or < name > may be left unspecified ( 0 ) . The purpose is to
* find a proxy based on some information from a previous configuration , across
* reloads or during information exchange between peers .
*
* Names are looked up first if present , then IDs are compared if present . In
* case of an inexact match whatever is forced in the configuration has
* precedence in the following order :
* - 1 ) forced ID ( proves a renaming / change of proxy type )
* - 2 ) proxy name + type ( may indicate a move if ID differs )
* - 3 ) automatic ID + type ( may indicate a renaming )
*
* Depending on what is found , we can end up in the following situations :
*
* name id cap | possible causes
* - - - - - - - - - - - - - + - - - - - - - - - - - - - - - - -
* - - - - - - | nothing found
* - - - - ok | nothing found
* - - ok - - | proxy deleted , ID points to next one
* - - ok ok | proxy renamed , or deleted with ID pointing to next one
* ok - - - - | proxy deleted , but other half with same name still here ( before )
* ok - - ok | proxy ' s ID changed ( proxy moved in the config file )
* ok ok - - | proxy deleted , but other half with same name still here ( after )
* ok ok ok | perfect match
*
* Upon return if < diff > is not NULL , it is zeroed then filled with up to 3 bits :
2015-07-03 05:03:33 -04:00
* - PR_FBM_MISMATCH_ID : proxy was found but ID differs
* ( and ID was not zero )
* - PR_FBM_MISMATCH_NAME : proxy was found by ID but name differs
* ( and name was not NULL )
* - PR_FBM_MISMATCH_PROXYTYPE : a proxy of different type was found with
* the same name and / or id
2015-05-27 10:46:26 -04:00
*
* Only a valid proxy is returned . If capabilities do not match , NULL is
* returned . The caller can check < diff > to report detailed warnings / errors ,
* and decide whether or not to use what was found .
*/
struct proxy * proxy_find_best_match ( int cap , const char * name , int id , int * diff )
{
struct proxy * byname ;
struct proxy * byid ;
if ( ! name & & ! id )
return NULL ;
if ( diff )
* diff = 0 ;
byname = byid = NULL ;
if ( name ) {
byname = proxy_find_by_name ( name , cap , 0 ) ;
if ( byname & & ( ! id | | byname - > uuid = = id ) )
return byname ;
}
2018-11-15 14:46:55 -05:00
/* remaining possibilities :
2015-05-27 10:46:26 -04:00
* - name not set
* - name set but not found
* - name found , but ID doesn ' t match .
*/
if ( id ) {
byid = proxy_find_by_id ( id , cap , 0 ) ;
if ( byid ) {
if ( byname ) {
/* id+type found, name+type found, but not all 3.
* ID wins only if forced , otherwise name wins .
*/
if ( byid - > options & PR_O_FORCED_ID ) {
if ( diff )
2015-07-03 05:03:33 -04:00
* diff | = PR_FBM_MISMATCH_NAME ;
2015-05-27 10:46:26 -04:00
return byid ;
}
else {
if ( diff )
2015-07-03 05:03:33 -04:00
* diff | = PR_FBM_MISMATCH_ID ;
2015-05-27 10:46:26 -04:00
return byname ;
}
}
2018-11-15 14:46:55 -05:00
/* remaining possibilities :
2015-05-27 10:46:26 -04:00
* - name not set
* - name set but not found
*/
if ( name & & diff )
2015-07-03 05:03:33 -04:00
* diff | = PR_FBM_MISMATCH_NAME ;
2015-05-27 10:46:26 -04:00
return byid ;
}
/* ID not found */
if ( byname ) {
if ( diff )
2015-07-03 05:03:33 -04:00
* diff | = PR_FBM_MISMATCH_ID ;
2015-05-27 10:46:26 -04:00
return byname ;
}
}
2018-11-15 14:46:55 -05:00
/* All remaining possibilities will lead to NULL. If we can report more
2015-05-27 10:46:26 -04:00
* detailed information to the caller about changed types and / or name ,
* we ' ll do it . For example , we could detect that " listen foo " was
* split into " frontend foo_ft " and " backend foo_bk " if IDs are forced .
* - name not set , ID not found
* - name not found , ID not set
* - name not found , ID not found
*/
if ( ! diff )
return NULL ;
if ( name ) {
byname = proxy_find_by_name ( name , 0 , 0 ) ;
if ( byname & & ( ! id | | byname - > uuid = = id ) )
2015-07-03 05:03:33 -04:00
* diff | = PR_FBM_MISMATCH_PROXYTYPE ;
2015-05-27 10:46:26 -04:00
}
if ( id ) {
byid = proxy_find_by_id ( id , 0 , 0 ) ;
if ( byid ) {
if ( ! name )
2015-07-03 05:03:33 -04:00
* diff | = PR_FBM_MISMATCH_PROXYTYPE ; /* only type changed */
2015-05-27 10:46:26 -04:00
else if ( byid - > options & PR_O_FORCED_ID )
2015-07-03 05:03:33 -04:00
* diff | = PR_FBM_MISMATCH_NAME | PR_FBM_MISMATCH_PROXYTYPE ; /* name and type changed */
2015-05-27 10:46:26 -04:00
/* otherwise it's a different proxy that was returned */
}
}
return NULL ;
}
2008-02-17 19:26:35 -05:00
/*
* This function finds a server with matching name within selected proxy .
* It also checks if there are more matching servers with
* requested name as this often leads into unexpected situations .
*/
struct server * findserver ( const struct proxy * px , const char * name ) {
struct server * cursrv , * target = NULL ;
if ( ! px )
return NULL ;
for ( cursrv = px - > srv ; cursrv ; cursrv = cursrv - > next ) {
CLEANUP: Compare the return value of `XXXcmp()` functions with zero
According to coding-style.txt it is recommended to use:
`strcmp(a, b) == 0` instead of `!strcmp(a, b)`
So let's do this.
The change was performed by running the following (very long) coccinelle patch
on src/:
@@
statement S;
expression E;
expression F;
@@
if (
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
(
S
|
{ ... }
)
@@
statement S;
expression E;
expression F;
@@
if (
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
(
S
|
{ ... }
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) != 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
G &&
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
G ||
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
&& G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
|| G
)
@@
expression E;
expression F;
expression G;
@@
(
- !
(
dns_hostname_cmp
|
eb_memcmp
|
memcmp
|
strcasecmp
|
strcmp
|
strncasecmp
|
strncmp
)
- (E, F)
+ (E, F) == 0
)
2021-01-02 16:31:53 -05:00
if ( strcmp ( cursrv - > id , name ) ! = 0 )
2008-02-17 19:26:35 -05:00
continue ;
if ( ! target ) {
target = cursrv ;
continue ;
}
2017-11-24 10:50:31 -05:00
ha_alert ( " Refusing to use duplicated server '%s' found in proxy: %s! \n " ,
name , px - > id ) ;
2008-02-17 19:26:35 -05:00
return NULL ;
}
return target ;
}
2009-03-15 08:46:16 -04:00
/* This function checks that the designated proxy has no http directives
* enabled . It will output a warning if there are , and will fix some of them .
* It returns the number of fatal errors encountered . This should be called
* at the end of the configuration parsing if the proxy is not in http mode .
* The < file > argument is used to construct the error message .
*/
2009-06-22 09:48:36 -04:00
int proxy_cfg_ensure_no_http ( struct proxy * curproxy )
2009-03-15 08:46:16 -04:00
{
if ( curproxy - > cookie_name ! = NULL ) {
2021-06-04 12:22:08 -04:00
ha_warning ( " cookie will be ignored for %s '%s' (needs 'mode http'). \n " ,
2017-11-24 10:50:31 -05:00
proxy_type_str ( curproxy ) , curproxy - > id ) ;
2009-03-15 08:46:16 -04:00
}
2009-10-03 06:21:20 -04:00
if ( curproxy - > lbprm . algo & BE_LB_NEED_HTTP ) {
2009-03-15 08:46:16 -04:00
curproxy - > lbprm . algo & = ~ BE_LB_ALGO ;
curproxy - > lbprm . algo | = BE_LB_ALGO_RR ;
2021-06-04 12:22:08 -04:00
ha_warning ( " Layer 7 hash not possible for %s '%s' (needs 'mode http'). Falling back to round robin. \n " ,
2017-11-24 10:50:31 -05:00
proxy_type_str ( curproxy ) , curproxy - > id ) ;
2009-03-15 08:46:16 -04:00
}
2009-11-09 15:27:51 -05:00
if ( curproxy - > to_log & ( LW_REQ | LW_RESP ) ) {
curproxy - > to_log & = ~ ( LW_REQ | LW_RESP ) ;
2017-11-24 10:50:31 -05:00
ha_warning ( " parsing [%s:%d] : HTTP log/header format not usable with %s '%s' (needs 'mode http'). \n " ,
curproxy - > conf . lfs_file , curproxy - > conf . lfs_line ,
proxy_type_str ( curproxy ) , curproxy - > id ) ;
2009-11-09 15:27:51 -05:00
}
2013-04-12 12:13:46 -04:00
if ( curproxy - > conf . logformat_string = = default_http_log_format | |
curproxy - > conf . logformat_string = = clf_http_log_format ) {
/* Note: we don't change the directive's file:line number */
curproxy - > conf . logformat_string = default_tcp_log_format ;
2017-11-24 10:50:31 -05:00
ha_warning ( " parsing [%s:%d] : 'option httplog' not usable with %s '%s' (needs 'mode http'). Falling back to 'option tcplog'. \n " ,
curproxy - > conf . lfs_file , curproxy - > conf . lfs_line ,
proxy_type_str ( curproxy ) , curproxy - > id ) ;
2012-05-31 13:30:26 -04:00
}
2021-07-29 03:45:52 -04:00
else if ( curproxy - > conf . logformat_string = = default_https_log_format ) {
/* Note: we don't change the directive's file:line number */
curproxy - > conf . logformat_string = default_tcp_log_format ;
ha_warning ( " parsing [%s:%d] : 'option httpslog' not usable with %s '%s' (needs 'mode http'). Falling back to 'option tcplog'. \n " ,
curproxy - > conf . lfs_file , curproxy - > conf . lfs_line ,
proxy_type_str ( curproxy ) , curproxy - > id ) ;
}
2012-05-31 13:30:26 -04:00
2009-03-15 08:46:16 -04:00
return 0 ;
}
2023-11-15 06:18:52 -05:00
/* This function checks that the designated proxy has no log directives
* enabled . It will output a warning if there are , and will fix some of them .
* It returns the number of fatal errors encountered . This should be called
* at the end of the configuration parsing if the proxy is not in log mode .
* The < file > argument is used to construct the error message .
*/
int proxy_cfg_ensure_no_log ( struct proxy * curproxy )
{
if ( curproxy - > lbprm . algo & BE_LB_NEED_LOG ) {
curproxy - > lbprm . algo & = ~ BE_LB_ALGO ;
curproxy - > lbprm . algo | = BE_LB_ALGO_RR ;
ha_warning ( " Unusable balance algorithm for %s '%s' (needs 'mode log'). Falling back to round robin. \n " ,
proxy_type_str ( curproxy ) , curproxy - > id ) ;
}
return 0 ;
}
2011-07-28 19:49:03 -04:00
/* Perform the most basic initialization of a proxy :
* memset ( ) , list_init ( * ) , reset_timeouts ( * ) .
2011-09-07 12:41:08 -04:00
* Any new proxy or peer should be initialized via this function .
2011-07-28 19:49:03 -04:00
*/
void init_new_proxy ( struct proxy * p )
{
memset ( p , 0 , sizeof ( struct proxy ) ) ;
2012-11-11 18:42:33 -05:00
p - > obj_type = OBJ_TYPE_PROXY ;
2021-06-23 10:11:02 -04:00
queue_init ( & p - > queue , p , NULL ) ;
2011-07-28 19:49:03 -04:00
LIST_INIT ( & p - > acl ) ;
LIST_INIT ( & p - > http_req_rules ) ;
2013-06-11 10:06:12 -04:00
LIST_INIT ( & p - > http_res_rules ) ;
2020-01-22 03:26:35 -05:00
LIST_INIT ( & p - > http_after_res_rules ) ;
2011-07-28 19:49:03 -04:00
LIST_INIT ( & p - > redirect_rules ) ;
LIST_INIT ( & p - > mon_fail_cond ) ;
LIST_INIT ( & p - > switching_rules ) ;
2012-04-05 15:09:48 -04:00
LIST_INIT ( & p - > server_rules ) ;
2011-07-28 19:49:03 -04:00
LIST_INIT ( & p - > persist_rules ) ;
LIST_INIT ( & p - > sticking_rules ) ;
LIST_INIT ( & p - > storersp_rules ) ;
LIST_INIT ( & p - > tcp_req . inspect_rules ) ;
LIST_INIT ( & p - > tcp_rep . inspect_rules ) ;
LIST_INIT ( & p - > tcp_req . l4_rules ) ;
2016-10-21 10:37:51 -04:00
LIST_INIT ( & p - > tcp_req . l5_rules ) ;
2019-08-08 09:47:21 -04:00
MT_LIST_INIT ( & p - > listener_queue ) ;
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
LIST_INIT ( & p - > loggers ) ;
2012-02-08 10:37:49 -05:00
LIST_INIT ( & p - > logformat ) ;
2015-09-25 13:17:44 -04:00
LIST_INIT ( & p - > logformat_sd ) ;
2012-03-12 07:48:57 -04:00
LIST_INIT ( & p - > format_unique_id ) ;
2021-08-31 06:08:52 -04:00
LIST_INIT ( & p - > logformat_error ) ;
2012-09-13 11:54:29 -04:00
LIST_INIT ( & p - > conf . bind ) ;
2012-09-20 10:48:07 -04:00
LIST_INIT ( & p - > conf . listeners ) ;
2020-01-13 09:52:01 -05:00
LIST_INIT ( & p - > conf . errors ) ;
MAJOR: sample: maintain a per-proxy list of the fetch args to resolve
While ACL args were resolved after all the config was parsed, it was not the
case with sample fetch args because they're almost everywhere now.
The issue is that ACLs now solely rely on sample fetches, so their args
resolving doesn't work anymore. And many fetches involving a server, a
proxy or a userlist don't work at all.
The real issue is that at the bottom layers we have no information about
proxies, line numbers, even ACLs in order to report understandable errors,
and that at the top layers we have no visibility over the locations where
fetches are referenced (think log node).
After failing multiple unsatisfying solutions attempts, we now have a new
concept of args list. The principle is that every proxy has a list head
which contains a number of indications such as the config keyword, the
context where it's used, the file and line number, etc... and a list of
arguments. This list head is of the same type as the elements, so it
serves as a template for adding new elements. This way, it is filled from
top to bottom by the callers with the information they have (eg: line
numbers, ACL name, ...) and the lower layers just have to duplicate it and
add an element when they face an argument they cannot resolve yet.
Then at the end of the configuration parsing, a loop passes over each
proxy's list and resolves all the args in sequence. And this way there is
all necessary information to report verbose errors.
The first immediate benefit is that for the first time we got very precise
location of issues (arg number in a keyword in its context, ...). Second,
in order to do this we had to parse log-format and unique-id-format a bit
earlier, so that was a great opportunity for doing so when the directives
are encountered (unless it's a default section). This way, the recorded
line numbers for these args are the ones of the place where the log format
is declared, not the end of the file.
Userlists report slightly more information now. They're the only remaining
ones in the ACL resolving function.
2013-04-02 10:34:32 -04:00
LIST_INIT ( & p - > conf . args . list ) ;
2016-02-04 07:40:26 -05:00
LIST_INIT ( & p - > filter_configs ) ;
2020-04-02 12:05:11 -04:00
LIST_INIT ( & p - > tcpcheck_rules . preset_vars ) ;
2011-07-28 19:49:03 -04:00
2021-02-12 03:15:16 -05:00
p - > defsrv . id = " default-server " ;
p - > conf . used_listener_id = EB_ROOT ;
p - > conf . used_server_id = EB_ROOT ;
p - > used_server_addr = EB_ROOT_UNIQUE ;
2011-07-28 19:49:03 -04:00
/* Timeouts are defined as -1 */
proxy_reset_timeouts ( p ) ;
p - > tcp_rep . inspect_delay = TICK_ETERNITY ;
2012-10-04 02:47:34 -04:00
/* initial uuid is unassigned (-1) */
p - > uuid = - 1 ;
2017-06-02 09:33:24 -04:00
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
/* Default to only allow L4 retries */
p - > retry_type = PR_RE_CONN_FAILED ;
2020-11-10 08:24:31 -05:00
p - > extra_counters_fe = NULL ;
p - > extra_counters_be = NULL ;
2020-10-20 11:24:27 -04:00
HA_RWLOCK_INIT ( & p - > lock ) ;
2023-11-13 03:17:05 -05:00
/* initialize the default settings */
proxy_preset_defaults ( p ) ;
2011-07-28 19:49:03 -04:00
}
2021-02-12 02:19:01 -05:00
/* Preset default settings onto proxy <defproxy>. */
void proxy_preset_defaults ( struct proxy * defproxy )
{
defproxy - > mode = PR_MODE_TCP ;
2021-10-06 08:24:19 -04:00
defproxy - > flags = 0 ;
2021-07-28 09:48:16 -04:00
if ( ! ( defproxy - > cap & PR_CAP_INT ) ) {
2021-03-24 05:49:34 -04:00
defproxy - > maxconn = cfg_maxpconn ;
defproxy - > conn_retries = CONN_RETRIES ;
}
2021-02-12 02:19:01 -05:00
defproxy - > redispatch_after = 0 ;
defproxy - > options = PR_O_REUSE_SAFE ;
2021-07-28 09:48:16 -04:00
if ( defproxy - > cap & PR_CAP_INT )
2021-03-24 05:49:34 -04:00
defproxy - > options2 | = PR_O2_INDEPSTR ;
2021-02-12 02:19:01 -05:00
defproxy - > max_out_conns = MAX_SRV_LIST ;
BUG/MEDIUM: server: fix dynamic servers initial settings
Contrary to static servers, dynamic servers does not initialize their
settings from a default server instance. As such, _srv_parse_init() was
responsible to set a set of minimal values to have a correct behavior.
However, some settings were not properly initialized. This caused
dynamic servers to not behave as static ones without explicit
parameters.
Currently, the main issue detected is connection reuse which was
completely impossible. This is due to incorrect pool_purge_delay and
max_reuse settings incompatible with srv_add_to_idle_list().
To fix the connection reuse, but also more generally to ensure dynamic
servers are aligned with other server instances, define a new function
srv_settings_init(). This is used to set initial values for both default
servers and dynamic servers. For static servers, srv_settings_cpy() is
kept instead, using their default server as reference.
This patch could have unexpected effects on dynamic servers behavior as
it restored proper initial settings. Previously, they were set to 0 via
calloc() invocation from new_server().
This should be backported up to 2.6, after a brief period of
observation.
2024-02-27 09:33:59 -05:00
srv_settings_init ( & defproxy - > defsrv ) ;
2021-02-12 02:19:01 -05:00
defproxy - > email_alert . level = LOG_ALERT ;
defproxy - > load_server_state_from_file = PR_SRV_STATE_FILE_UNSPEC ;
2021-03-24 05:49:34 -04:00
2021-07-28 09:48:16 -04:00
if ( defproxy - > cap & PR_CAP_INT )
2021-03-24 05:49:34 -04:00
defproxy - > timeout . connect = 5000 ;
2021-02-12 02:19:01 -05:00
}
2021-02-12 04:38:49 -05:00
/* Frees all dynamic settings allocated on a default proxy that's about to be
* destroyed . This is a subset of the complete proxy deinit code , but these
* should probably be merged ultimately . Note that most of the fields are not
* even reset , so extreme care is required here , and calling
* proxy_preset_defaults ( ) afterwards would be safer .
*/
void proxy_free_defaults ( struct proxy * defproxy )
{
2021-10-15 08:33:34 -04:00
struct acl * acl , * aclb ;
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
struct logger * log , * logb ;
2022-04-25 08:30:58 -04:00
struct cap_hdr * h , * h_next ;
2021-10-15 08:33:34 -04:00
2021-02-20 04:46:51 -05:00
ha_free ( & defproxy - > id ) ;
ha_free ( & defproxy - > conf . file ) ;
2023-11-23 08:28:14 -05:00
ha_free ( ( char * * ) & defproxy - > defsrv . conf . file ) ;
2021-02-20 04:46:51 -05:00
ha_free ( & defproxy - > check_command ) ;
ha_free ( & defproxy - > check_path ) ;
ha_free ( & defproxy - > cookie_name ) ;
ha_free ( & defproxy - > rdp_cookie_name ) ;
ha_free ( & defproxy - > dyncookie_key ) ;
ha_free ( & defproxy - > cookie_domain ) ;
ha_free ( & defproxy - > cookie_attrs ) ;
ha_free ( & defproxy - > lbprm . arg_str ) ;
ha_free ( & defproxy - > capture_name ) ;
2022-03-04 18:52:40 -05:00
istfree ( & defproxy - > monitor_uri ) ;
2021-02-20 04:46:51 -05:00
ha_free ( & defproxy - > defbe . name ) ;
ha_free ( & defproxy - > conn_src . iface_name ) ;
2022-03-04 18:52:43 -05:00
istfree ( & defproxy - > server_id_hdr_name ) ;
2021-02-12 04:38:49 -05:00
2023-01-09 05:09:03 -05:00
http_ext_clean ( defproxy ) ;
2022-12-28 09:37:57 -05:00
2021-10-15 08:33:34 -04:00
list_for_each_entry_safe ( acl , aclb , & defproxy - > acl , list ) {
LIST_DELETE ( & acl - > list ) ;
prune_acl ( acl ) ;
free ( acl ) ;
}
free_act_rules ( & defproxy - > tcp_req . inspect_rules ) ;
free_act_rules ( & defproxy - > tcp_rep . inspect_rules ) ;
free_act_rules ( & defproxy - > tcp_req . l4_rules ) ;
free_act_rules ( & defproxy - > tcp_req . l5_rules ) ;
free_act_rules ( & defproxy - > http_req_rules ) ;
free_act_rules ( & defproxy - > http_res_rules ) ;
free_act_rules ( & defproxy - > http_after_res_rules ) ;
2022-04-25 08:30:58 -04:00
h = defproxy - > req_cap ;
while ( h ) {
h_next = h - > next ;
free ( h - > name ) ;
pool_destroy ( h - > pool ) ;
free ( h ) ;
h = h_next ;
}
h = defproxy - > rsp_cap ;
while ( h ) {
h_next = h - > next ;
free ( h - > name ) ;
pool_destroy ( h - > pool ) ;
free ( h ) ;
h = h_next ;
}
2021-02-12 04:38:49 -05:00
if ( defproxy - > conf . logformat_string ! = default_http_log_format & &
defproxy - > conf . logformat_string ! = default_tcp_log_format & &
2021-07-29 03:45:52 -04:00
defproxy - > conf . logformat_string ! = clf_http_log_format & &
defproxy - > conf . logformat_string ! = default_https_log_format ) {
2021-02-20 04:46:51 -05:00
ha_free ( & defproxy - > conf . logformat_string ) ;
2021-02-12 04:48:53 -05:00
}
2021-02-12 04:38:49 -05:00
2021-02-20 04:46:51 -05:00
if ( defproxy - > conf . logformat_sd_string ! = default_rfc5424_sd_log_format )
ha_free ( & defproxy - > conf . logformat_sd_string ) ;
2021-02-12 04:38:49 -05:00
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
list_for_each_entry_safe ( log , logb , & defproxy - > loggers , list ) {
2022-03-17 14:47:33 -04:00
LIST_DEL_INIT ( & log - > list ) ;
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
free_logger ( log ) ;
2022-03-17 14:47:33 -04:00
}
2021-02-20 04:46:51 -05:00
ha_free ( & defproxy - > conf . uniqueid_format_string ) ;
2021-08-31 06:08:52 -04:00
ha_free ( & defproxy - > conf . error_logformat_string ) ;
2021-02-20 04:46:51 -05:00
ha_free ( & defproxy - > conf . lfs_file ) ;
ha_free ( & defproxy - > conf . lfsd_file ) ;
ha_free ( & defproxy - > conf . uif_file ) ;
2021-08-31 06:08:52 -04:00
ha_free ( & defproxy - > conf . elfs_file ) ;
2021-02-12 04:38:49 -05:00
chunk_destroy ( & defproxy - > log_tag ) ;
free_email_alert ( defproxy ) ;
proxy_release_conf_errors ( defproxy ) ;
deinit_proxy_tcpcheck ( defproxy ) ;
/* FIXME: we cannot free uri_auth because it might already be used by
* another proxy ( legacy code for stats URI . . . ) . Refcount anyone ?
*/
}
2021-02-12 07:52:11 -05:00
/* delete a defproxy from the tree if still in it, frees its content and its
* storage . Nothing is done if < px > is NULL or if it doesn ' t have PR_CAP_DEF
* set , allowing to pass it the direct result of a lookup function .
*/
void proxy_destroy_defaults ( struct proxy * px )
{
if ( ! px )
return ;
if ( ! ( px - > cap & PR_CAP_DEF ) )
return ;
2021-10-13 03:50:53 -04:00
BUG_ON ( px - > conf . refcount ! = 0 ) ;
2021-02-12 07:52:11 -05:00
ebpt_delete ( & px - > conf . by_name ) ;
proxy_free_defaults ( px ) ;
free ( px ) ;
}
2021-10-13 03:50:53 -04:00
/* delete all unreferenced default proxies. A default proxy is unreferenced if
* its refcount is equal to zero .
*/
void proxy_destroy_all_unref_defaults ( )
2021-02-12 08:08:31 -05:00
{
struct ebpt_node * n ;
2021-10-13 03:50:53 -04:00
n = ebpt_first ( & defproxy_by_name ) ;
while ( n ) {
2021-02-12 08:08:31 -05:00
struct proxy * px = container_of ( n , struct proxy , conf . by_name ) ;
BUG_ON ( ! ( px - > cap & PR_CAP_DEF ) ) ;
2021-10-13 03:50:53 -04:00
n = ebpt_next ( n ) ;
if ( ! px - > conf . refcount )
proxy_destroy_defaults ( px ) ;
2021-02-12 08:08:31 -05:00
}
}
2021-10-13 03:50:53 -04:00
/* Add a reference on the default proxy <defpx> for the proxy <px> Nothing is
* done if < px > already references < defpx > . Otherwise , the default proxy
* refcount is incremented by one . For now , this operation is not thread safe
* and is perform during init stage only .
*/
void proxy_ref_defaults ( struct proxy * px , struct proxy * defpx )
{
if ( px - > defpx = = defpx )
return ;
BUG_ON ( px - > defpx ! = NULL ) ;
px - > defpx = defpx ;
defpx - > conf . refcount + + ;
}
/* proxy <px> removes its reference on its default proxy. The default proxy
* refcount is decremented by one . If it was the last reference , the
* corresponding default proxy is destroyed . For now this operation is not
* thread safe and is performed during deinit staged only .
*/
void proxy_unref_defaults ( struct proxy * px )
{
if ( px - > defpx = = NULL )
return ;
if ( ! - - px - > defpx - > conf . refcount )
proxy_destroy_defaults ( px - > defpx ) ;
px - > defpx = NULL ;
}
2021-03-23 12:27:05 -04:00
/* Allocates a new proxy <name> of type <cap>.
* Returns the proxy instance on success . On error , NULL is returned .
2021-02-12 02:49:47 -05:00
*/
2021-03-23 12:27:05 -04:00
struct proxy * alloc_new_proxy ( const char * name , unsigned int cap , char * * errmsg )
2021-02-12 02:49:47 -05:00
{
struct proxy * curproxy ;
if ( ( curproxy = calloc ( 1 , sizeof ( * curproxy ) ) ) = = NULL ) {
memprintf ( errmsg , " proxy '%s': out of memory " , name ) ;
goto fail ;
}
init_new_proxy ( curproxy ) ;
2023-04-28 03:16:15 -04:00
curproxy - > last_change = ns_to_sec ( now_ns ) ;
2021-02-12 02:49:47 -05:00
curproxy - > id = strdup ( name ) ;
curproxy - > cap = cap ;
2021-03-24 05:49:34 -04:00
2021-07-28 09:48:16 -04:00
if ( ! ( cap & PR_CAP_INT ) )
2021-03-24 05:49:34 -04:00
proxy_store_name ( curproxy ) ;
2021-02-12 02:49:47 -05:00
2021-03-23 12:27:05 -04:00
done :
return curproxy ;
fail :
/* Note: in case of fatal error here, we WILL make valgrind unhappy,
* but its not worth trying to unroll everything here just before
* quitting .
*/
free ( curproxy ) ;
return NULL ;
}
/* Copy the proxy settings from <defproxy> to <curproxy>.
* Returns 0 on success .
* Returns 1 on error . < errmsg > will be allocated with an error description .
*/
static int proxy_defproxy_cpy ( struct proxy * curproxy , const struct proxy * defproxy ,
char * * errmsg )
{
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
struct logger * tmplogger ;
2021-03-23 12:27:05 -04:00
char * tmpmsg = NULL ;
2021-02-12 03:15:16 -05:00
/* set default values from the specified default proxy */
2022-08-03 05:31:55 -04:00
srv_settings_cpy ( & curproxy - > defsrv , & defproxy - > defsrv , 0 ) ;
2021-02-12 02:49:47 -05:00
2021-10-13 04:10:09 -04:00
curproxy - > flags = ( defproxy - > flags & PR_FL_DISABLED ) ; /* Only inherit from disabled flag */
2021-02-12 02:49:47 -05:00
curproxy - > options = defproxy - > options ;
curproxy - > options2 = defproxy - > options2 ;
curproxy - > no_options = defproxy - > no_options ;
curproxy - > no_options2 = defproxy - > no_options2 ;
curproxy - > retry_type = defproxy - > retry_type ;
2021-10-13 09:40:15 -04:00
curproxy - > tcp_req . inspect_delay = defproxy - > tcp_req . inspect_delay ;
curproxy - > tcp_rep . inspect_delay = defproxy - > tcp_rep . inspect_delay ;
2021-02-12 02:49:47 -05:00
2023-01-09 05:09:03 -05:00
http_ext_clean ( curproxy ) ;
http_ext_dup ( defproxy , curproxy ) ;
2021-02-12 02:49:47 -05:00
2022-03-04 18:52:43 -05:00
if ( isttest ( defproxy - > server_id_hdr_name ) )
curproxy - > server_id_hdr_name = istdup ( defproxy - > server_id_hdr_name ) ;
2021-02-12 02:49:47 -05:00
/* initialize error relocations */
if ( ! proxy_dup_default_conf_errors ( curproxy , defproxy , & tmpmsg ) ) {
memprintf ( errmsg , " proxy '%s' : %s " , curproxy - > id , tmpmsg ) ;
2021-03-23 12:27:05 -04:00
free ( tmpmsg ) ;
return 1 ;
2021-02-12 02:49:47 -05:00
}
if ( curproxy - > cap & PR_CAP_FE ) {
curproxy - > maxconn = defproxy - > maxconn ;
curproxy - > backlog = defproxy - > backlog ;
curproxy - > fe_sps_lim = defproxy - > fe_sps_lim ;
curproxy - > to_log = defproxy - > to_log & ~ LW_COOKIE & ~ LW_REQHDR & ~ LW_RSPHDR ;
curproxy - > max_out_conns = defproxy - > max_out_conns ;
curproxy - > clitcpka_cnt = defproxy - > clitcpka_cnt ;
curproxy - > clitcpka_idle = defproxy - > clitcpka_idle ;
curproxy - > clitcpka_intvl = defproxy - > clitcpka_intvl ;
}
if ( curproxy - > cap & PR_CAP_BE ) {
curproxy - > lbprm . algo = defproxy - > lbprm . algo ;
curproxy - > lbprm . hash_balance_factor = defproxy - > lbprm . hash_balance_factor ;
curproxy - > fullconn = defproxy - > fullconn ;
curproxy - > conn_retries = defproxy - > conn_retries ;
curproxy - > redispatch_after = defproxy - > redispatch_after ;
curproxy - > max_ka_queue = defproxy - > max_ka_queue ;
curproxy - > tcpcheck_rules . flags = ( defproxy - > tcpcheck_rules . flags & ~ TCPCHK_RULES_UNUSED_RS ) ;
curproxy - > tcpcheck_rules . list = defproxy - > tcpcheck_rules . list ;
if ( ! LIST_ISEMPTY ( & defproxy - > tcpcheck_rules . preset_vars ) ) {
if ( ! dup_tcpcheck_vars ( & curproxy - > tcpcheck_rules . preset_vars ,
& defproxy - > tcpcheck_rules . preset_vars ) ) {
2021-03-23 12:27:05 -04:00
memprintf ( errmsg , " proxy '%s': failed to duplicate tcpcheck preset-vars " , curproxy - > id ) ;
return 1 ;
2021-02-12 02:49:47 -05:00
}
}
curproxy - > ck_opts = defproxy - > ck_opts ;
2022-12-28 09:37:57 -05:00
2021-02-12 02:49:47 -05:00
if ( defproxy - > cookie_name )
curproxy - > cookie_name = strdup ( defproxy - > cookie_name ) ;
curproxy - > cookie_len = defproxy - > cookie_len ;
if ( defproxy - > dyncookie_key )
curproxy - > dyncookie_key = strdup ( defproxy - > dyncookie_key ) ;
if ( defproxy - > cookie_domain )
curproxy - > cookie_domain = strdup ( defproxy - > cookie_domain ) ;
if ( defproxy - > cookie_maxidle )
curproxy - > cookie_maxidle = defproxy - > cookie_maxidle ;
if ( defproxy - > cookie_maxlife )
curproxy - > cookie_maxlife = defproxy - > cookie_maxlife ;
if ( defproxy - > rdp_cookie_name )
curproxy - > rdp_cookie_name = strdup ( defproxy - > rdp_cookie_name ) ;
curproxy - > rdp_cookie_len = defproxy - > rdp_cookie_len ;
if ( defproxy - > cookie_attrs )
curproxy - > cookie_attrs = strdup ( defproxy - > cookie_attrs ) ;
if ( defproxy - > lbprm . arg_str )
curproxy - > lbprm . arg_str = strdup ( defproxy - > lbprm . arg_str ) ;
curproxy - > lbprm . arg_len = defproxy - > lbprm . arg_len ;
curproxy - > lbprm . arg_opt1 = defproxy - > lbprm . arg_opt1 ;
curproxy - > lbprm . arg_opt2 = defproxy - > lbprm . arg_opt2 ;
curproxy - > lbprm . arg_opt3 = defproxy - > lbprm . arg_opt3 ;
if ( defproxy - > conn_src . iface_name )
curproxy - > conn_src . iface_name = strdup ( defproxy - > conn_src . iface_name ) ;
curproxy - > conn_src . iface_len = defproxy - > conn_src . iface_len ;
curproxy - > conn_src . opts = defproxy - > conn_src . opts ;
# if defined(CONFIG_HAP_TRANSPARENT)
curproxy - > conn_src . tproxy_addr = defproxy - > conn_src . tproxy_addr ;
# endif
curproxy - > load_server_state_from_file = defproxy - > load_server_state_from_file ;
curproxy - > srvtcpka_cnt = defproxy - > srvtcpka_cnt ;
curproxy - > srvtcpka_idle = defproxy - > srvtcpka_idle ;
curproxy - > srvtcpka_intvl = defproxy - > srvtcpka_intvl ;
}
if ( curproxy - > cap & PR_CAP_FE ) {
if ( defproxy - > capture_name )
curproxy - > capture_name = strdup ( defproxy - > capture_name ) ;
curproxy - > capture_namelen = defproxy - > capture_namelen ;
curproxy - > capture_len = defproxy - > capture_len ;
2022-04-25 08:30:58 -04:00
curproxy - > nb_req_cap = defproxy - > nb_req_cap ;
curproxy - > req_cap = defproxy - > req_cap ;
curproxy - > nb_rsp_cap = defproxy - > nb_rsp_cap ;
curproxy - > rsp_cap = defproxy - > rsp_cap ;
2021-02-12 02:49:47 -05:00
}
if ( curproxy - > cap & PR_CAP_FE ) {
curproxy - > timeout . client = defproxy - > timeout . client ;
2023-11-17 12:03:20 -05:00
curproxy - > timeout . client_hs = defproxy - > timeout . client_hs ;
2021-02-12 02:49:47 -05:00
curproxy - > timeout . clientfin = defproxy - > timeout . clientfin ;
curproxy - > timeout . tarpit = defproxy - > timeout . tarpit ;
curproxy - > timeout . httpreq = defproxy - > timeout . httpreq ;
curproxy - > timeout . httpka = defproxy - > timeout . httpka ;
2022-03-04 18:52:40 -05:00
if ( isttest ( defproxy - > monitor_uri ) )
curproxy - > monitor_uri = istdup ( defproxy - > monitor_uri ) ;
2021-02-12 02:49:47 -05:00
if ( defproxy - > defbe . name )
curproxy - > defbe . name = strdup ( defproxy - > defbe . name ) ;
/* get either a pointer to the logformat string or a copy of it */
curproxy - > conf . logformat_string = defproxy - > conf . logformat_string ;
if ( curproxy - > conf . logformat_string & &
curproxy - > conf . logformat_string ! = default_http_log_format & &
curproxy - > conf . logformat_string ! = default_tcp_log_format & &
2021-07-29 03:45:52 -04:00
curproxy - > conf . logformat_string ! = clf_http_log_format & &
curproxy - > conf . logformat_string ! = default_https_log_format )
2021-02-12 02:49:47 -05:00
curproxy - > conf . logformat_string = strdup ( curproxy - > conf . logformat_string ) ;
if ( defproxy - > conf . lfs_file ) {
curproxy - > conf . lfs_file = strdup ( defproxy - > conf . lfs_file ) ;
curproxy - > conf . lfs_line = defproxy - > conf . lfs_line ;
}
/* get either a pointer to the logformat string for RFC5424 structured-data or a copy of it */
curproxy - > conf . logformat_sd_string = defproxy - > conf . logformat_sd_string ;
if ( curproxy - > conf . logformat_sd_string & &
curproxy - > conf . logformat_sd_string ! = default_rfc5424_sd_log_format )
curproxy - > conf . logformat_sd_string = strdup ( curproxy - > conf . logformat_sd_string ) ;
if ( defproxy - > conf . lfsd_file ) {
curproxy - > conf . lfsd_file = strdup ( defproxy - > conf . lfsd_file ) ;
curproxy - > conf . lfsd_line = defproxy - > conf . lfsd_line ;
}
2021-08-31 06:08:52 -04:00
curproxy - > conf . error_logformat_string = defproxy - > conf . error_logformat_string ;
if ( curproxy - > conf . error_logformat_string )
curproxy - > conf . error_logformat_string = strdup ( curproxy - > conf . error_logformat_string ) ;
if ( defproxy - > conf . elfs_file ) {
curproxy - > conf . elfs_file = strdup ( defproxy - > conf . elfs_file ) ;
curproxy - > conf . elfs_line = defproxy - > conf . elfs_line ;
}
2021-02-12 02:49:47 -05:00
}
if ( curproxy - > cap & PR_CAP_BE ) {
curproxy - > timeout . connect = defproxy - > timeout . connect ;
curproxy - > timeout . server = defproxy - > timeout . server ;
curproxy - > timeout . serverfin = defproxy - > timeout . serverfin ;
curproxy - > timeout . check = defproxy - > timeout . check ;
curproxy - > timeout . queue = defproxy - > timeout . queue ;
curproxy - > timeout . tarpit = defproxy - > timeout . tarpit ;
curproxy - > timeout . httpreq = defproxy - > timeout . httpreq ;
curproxy - > timeout . httpka = defproxy - > timeout . httpka ;
curproxy - > timeout . tunnel = defproxy - > timeout . tunnel ;
curproxy - > conn_src . source_addr = defproxy - > conn_src . source_addr ;
}
curproxy - > mode = defproxy - > mode ;
curproxy - > uri_auth = defproxy - > uri_auth ; /* for stats */
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
/* copy default loggers to curproxy */
list_for_each_entry ( tmplogger , & defproxy - > loggers , list ) {
struct logger * node = dup_logger ( tmplogger ) ;
2021-02-12 02:49:47 -05:00
if ( ! node ) {
2021-03-23 12:27:05 -04:00
memprintf ( errmsg , " proxy '%s': out of memory " , curproxy - > id ) ;
return 1 ;
2021-02-12 02:49:47 -05:00
}
MEDIUM: tree-wide: logsrv struct becomes logger
When 'log' directive was implemented, the internal representation was
named 'struct logsrv', because the 'log' directive would directly point
to the log target, which used to be a (UDP) log server exclusively at
that time, hence the name.
But things have become more complex, since today 'log' directive can point
to ring targets (implicit, or named) for example.
Indeed, a 'log' directive does no longer reference the "final" server to
which the log will be sent, but instead it describes which log API and
parameters to use for transporting the log messages to the proper log
destination.
So now the term 'logsrv' is rather confusing and prevents us from
introducing a new level of abstraction because they would be mixed
with logsrv.
So in order to better designate this 'log' directive, and make it more
generic, we chose the word 'logger' which now replaces logsrv everywhere
it was used in the code (including related comments).
This is internal rewording, so no functional change should be expected
on user-side.
2023-09-11 09:06:53 -04:00
LIST_APPEND ( & curproxy - > loggers , & node - > list ) ;
2021-02-12 02:49:47 -05:00
}
curproxy - > conf . uniqueid_format_string = defproxy - > conf . uniqueid_format_string ;
if ( curproxy - > conf . uniqueid_format_string )
curproxy - > conf . uniqueid_format_string = strdup ( curproxy - > conf . uniqueid_format_string ) ;
chunk_dup ( & curproxy - > log_tag , & defproxy - > log_tag ) ;
if ( defproxy - > conf . uif_file ) {
curproxy - > conf . uif_file = strdup ( defproxy - > conf . uif_file ) ;
curproxy - > conf . uif_line = defproxy - > conf . uif_line ;
}
/* copy default header unique id */
if ( isttest ( defproxy - > header_unique_id ) ) {
const struct ist copy = istdup ( defproxy - > header_unique_id ) ;
if ( ! isttest ( copy ) ) {
2021-03-23 12:27:05 -04:00
memprintf ( errmsg , " proxy '%s': out of memory for unique-id-header " , curproxy - > id ) ;
return 1 ;
2021-02-12 02:49:47 -05:00
}
curproxy - > header_unique_id = copy ;
}
/* default compression options */
if ( defproxy - > comp ! = NULL ) {
curproxy - > comp = calloc ( 1 , sizeof ( * curproxy - > comp ) ) ;
2021-05-12 12:07:27 -04:00
if ( ! curproxy - > comp ) {
memprintf ( errmsg , " proxy '%s': out of memory for default compression options " , curproxy - > id ) ;
return 1 ;
}
2023-04-05 11:32:36 -04:00
curproxy - > comp - > algos_res = defproxy - > comp - > algos_res ;
curproxy - > comp - > algo_req = defproxy - > comp - > algo_req ;
curproxy - > comp - > types_res = defproxy - > comp - > types_res ;
curproxy - > comp - > types_req = defproxy - > comp - > types_req ;
2023-05-10 10:39:00 -04:00
curproxy - > comp - > flags = defproxy - > comp - > flags ;
2021-02-12 02:49:47 -05:00
}
if ( defproxy - > check_path )
curproxy - > check_path = strdup ( defproxy - > check_path ) ;
if ( defproxy - > check_command )
curproxy - > check_command = strdup ( defproxy - > check_command ) ;
if ( defproxy - > email_alert . mailers . name )
curproxy - > email_alert . mailers . name = strdup ( defproxy - > email_alert . mailers . name ) ;
if ( defproxy - > email_alert . from )
curproxy - > email_alert . from = strdup ( defproxy - > email_alert . from ) ;
if ( defproxy - > email_alert . to )
curproxy - > email_alert . to = strdup ( defproxy - > email_alert . to ) ;
if ( defproxy - > email_alert . myhostname )
curproxy - > email_alert . myhostname = strdup ( defproxy - > email_alert . myhostname ) ;
curproxy - > email_alert . level = defproxy - > email_alert . level ;
curproxy - > email_alert . set = defproxy - > email_alert . set ;
2021-02-12 03:15:16 -05:00
2021-03-23 12:27:05 -04:00
return 0 ;
}
/* Allocates a new proxy <name> of type <cap> found at position <file:linenum>,
* preset it from the defaults of < defproxy > and returns it . In case of error ,
* an alert is printed and NULL is returned .
*/
struct proxy * parse_new_proxy ( const char * name , unsigned int cap ,
const char * file , int linenum ,
const struct proxy * defproxy )
{
struct proxy * curproxy = NULL ;
2022-02-24 10:37:19 -05:00
char * errmsg = NULL ;
2021-03-23 12:27:05 -04:00
if ( ! ( curproxy = alloc_new_proxy ( name , cap , & errmsg ) ) ) {
ha_alert ( " parsing [%s:%d] : %s \n " , file , linenum , errmsg ) ;
free ( errmsg ) ;
return NULL ;
}
if ( defproxy ) {
if ( proxy_defproxy_cpy ( curproxy , defproxy , & errmsg ) ) {
ha_alert ( " parsing [%s:%d] : %s \n " , file , linenum , errmsg ) ;
free ( errmsg ) ;
ha_free ( & curproxy ) ;
return NULL ;
}
}
curproxy - > conf . args . file = curproxy - > conf . file = strdup ( file ) ;
curproxy - > conf . args . line = curproxy - > conf . line = linenum ;
2021-02-12 02:49:47 -05:00
return curproxy ;
}
2022-09-09 09:51:37 -04:00
/* to be called under the proxy lock after pausing some listeners. This will
* automatically update the p - > flags flag
*/
void proxy_cond_pause ( struct proxy * p )
{
if ( p - > li_ready )
return ;
p - > flags | = PR_FL_PAUSED ;
}
/* to be called under the proxy lock after resuming some listeners. This will
* automatically update the p - > flags flag
*/
void proxy_cond_resume ( struct proxy * p )
{
if ( ! p - > li_ready )
return ;
p - > flags & = ~ PR_FL_PAUSED ;
}
2020-10-07 10:31:39 -04:00
/* to be called under the proxy lock after stopping some listeners. This will
2021-10-06 08:24:19 -04:00
* automatically update the p - > flags flag after stopping the last one , and
2020-10-07 10:31:39 -04:00
* will emit a log indicating the proxy ' s condition . The function is idempotent
* so that it will not emit multiple logs ; a proxy will be disabled only once .
*/
void proxy_cond_disable ( struct proxy * p )
{
2021-10-06 08:24:19 -04:00
if ( p - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) )
2020-10-07 10:31:39 -04:00
return ;
if ( p - > li_ready + p - > li_paused > 0 )
return ;
2021-10-06 08:24:19 -04:00
p - > flags | = PR_FL_STOPPED ;
2020-10-07 10:31:39 -04:00
/* Note: syslog proxies use their own loggers so while it's somewhat OK
* to report them being stopped as a warning , we must not spam their log
* servers which are in fact production servers . For other types ( CLI ,
* peers , etc ) we must not report them at all as they ' re not really on
* the data plane but on the control plane .
*/
2023-05-14 17:23:36 -04:00
if ( ( p - > mode = = PR_MODE_TCP | | p - > mode = = PR_MODE_HTTP | | p - > mode = = PR_MODE_SYSLOG ) & & ! ( p - > cap & PR_CAP_INT ) )
2020-10-07 10:31:39 -04:00
ha_warning ( " Proxy %s stopped (cumulated conns: FE: %lld, BE: %lld). \n " ,
p - > id , p - > fe_counters . cum_conn , p - > be_counters . cum_conn ) ;
2023-05-14 17:23:36 -04:00
if ( ( p - > mode = = PR_MODE_TCP | | p - > mode = = PR_MODE_HTTP ) & & ! ( p - > cap & PR_CAP_INT ) )
2020-10-07 10:31:39 -04:00
send_log ( p , LOG_WARNING , " Proxy %s stopped (cumulated conns: FE: %lld, BE: %lld). \n " ,
p - > id , p - > fe_counters . cum_conn , p - > be_counters . cum_conn ) ;
if ( p - > table & & p - > table - > size & & p - > table - > sync_task )
task_wakeup ( p - > table - > sync_task , TASK_WOKEN_MSG ) ;
if ( p - > task )
task_wakeup ( p - > task , TASK_WOKEN_MSG ) ;
}
2006-06-25 20:48:02 -04:00
/*
2011-07-25 10:33:49 -04:00
* This is the proxy management task . It enables proxies when there are enough
REORG/MAJOR: session: rename the "session" entity to "stream"
With HTTP/2, we'll have to support multiplexed streams. A stream is in
fact the largest part of what we currently call a session, it has buffers,
logs, etc.
In order to catch any error, this commit removes any reference to the
struct session and tries to rename most "session" occurrences in function
names to "stream" and "sess" to "strm" when that's related to a session.
The files stream.{c,h} were added and session.{c,h} removed.
The session will be reintroduced later and a few parts of the stream
will progressively be moved overthere. It will more or less contain
only what we need in an embryonic session.
Sample fetch functions and converters will have to change a bit so
that they'll use an L5 (session) instead of what's currently called
"L4" which is in fact L6 for now.
Once all changes are completed, we should see approximately this :
L7 - http_txn
L6 - stream
L5 - session
L4 - connection | applet
There will be at most one http_txn per stream, and a same session will
possibly be referenced by multiple streams. A connection will point to
a session and to a stream. The session will hold all the information
we need to keep even when we don't yet have a stream.
Some more cleanup is needed because some code was already far from
being clean. The server queue management still refers to sessions at
many places while comments talk about connections. This will have to
be cleaned up once we have a server-side connection pool manager.
Stream flags "SN_*" still need to be renamed, it doesn't seem like
any of them will need to move to the session.
2015-04-02 18:22:06 -04:00
* free streams , or stops them when the table is full . It is designed to be
2011-07-25 10:33:49 -04:00
* called as a task which is woken up upon stopping or when rate limiting must
* be enforced .
2006-06-25 20:48:02 -04:00
*/
2021-03-02 10:09:26 -05:00
struct task * manage_proxy ( struct task * t , void * context , unsigned int state )
2006-06-25 20:48:02 -04:00
{
2018-05-25 08:04:04 -04:00
struct proxy * p = context ;
2011-07-25 10:33:49 -04:00
int next = TICK_ETERNITY ;
2009-03-06 03:18:27 -05:00
unsigned int wait ;
2006-06-25 20:48:02 -04:00
2011-07-25 10:33:49 -04:00
/* We should periodically try to enable listeners waiting for a
* global resource here .
*/
2013-09-04 11:54:01 -04:00
/* If the proxy holds a stick table, we need to purge all unused
* entries . These are all the ones in the table with ref_cnt = = 0
* and all the ones in the pool used to allocate new entries . Any
REORG/MAJOR: session: rename the "session" entity to "stream"
With HTTP/2, we'll have to support multiplexed streams. A stream is in
fact the largest part of what we currently call a session, it has buffers,
logs, etc.
In order to catch any error, this commit removes any reference to the
struct session and tries to rename most "session" occurrences in function
names to "stream" and "sess" to "strm" when that's related to a session.
The files stream.{c,h} were added and session.{c,h} removed.
The session will be reintroduced later and a few parts of the stream
will progressively be moved overthere. It will more or less contain
only what we need in an embryonic session.
Sample fetch functions and converters will have to change a bit so
that they'll use an L5 (session) instead of what's currently called
"L4" which is in fact L6 for now.
Once all changes are completed, we should see approximately this :
L7 - http_txn
L6 - stream
L5 - session
L4 - connection | applet
There will be at most one http_txn per stream, and a same session will
possibly be referenced by multiple streams. A connection will point to
a session and to a stream. The session will hold all the information
we need to keep even when we don't yet have a stream.
Some more cleanup is needed because some code was already far from
being clean. The server queue management still refers to sessions at
many places while comments talk about connections. This will have to
be cleaned up once we have a server-side connection pool manager.
Stream flags "SN_*" still need to be renamed, it doesn't seem like
any of them will need to move to the session.
2015-04-02 18:22:06 -04:00
* entry attached to an existing stream waiting for a store will
2013-09-04 11:54:01 -04:00
* be in neither list . Any entry being dumped will have ref_cnt > 0.
* However we protect tables that are being synced to peers .
*/
2021-10-06 08:24:19 -04:00
if ( unlikely ( stopping & & ( p - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) ) & & p - > table & & p - > table - > current ) ) {
2021-04-23 06:21:26 -04:00
if ( ! p - > table - > refcnt ) {
/* !table->refcnt means there
* is no more pending full resync
* to push to a new process and
* we are free to flush the table .
*/
BUG/MEDIUM: proxy/sktable: prevent watchdog trigger on soft-stop
During soft-stop, manage_proxy() (p->task) will try to purge
trashable (expired and not referenced) sticktable entries,
effectively releasing the process memory to leave some space
for new processes.
This is done by calling stktable_trash_oldest(), immediately
followed by a pool_gc() to give the memory back to the OS.
As already mentioned in dfe7925 ("BUG/MEDIUM: stick-table:
limit the time spent purging old entries"), calling
stktable_trash_oldest() with a huge batch can result in the function
spending too much time searching and purging entries, and ultimately
triggering the watchdog.
Lately, an internal issue was reported in which we could see
that the watchdog is being triggered in stktable_trash_oldest()
on soft-stop (thus initiated by manage_proxy())
According to the report, the crash seems to only occur since 5938021
("BUG/MEDIUM: stick-table: do not leave entries in end of window during purge")
This could be the result of stktable_trash_oldest() now working
as expected, and thus spending a large amount of time purging
entries when called with a large enough <to_batch>.
Instead of adding new checks in stktable_trash_oldest(), here we
chose to address the issue directly in manage_proxy().
Since the stktable_trash_oldest() function is called with
<to_batch> == <p->table->current>, it's pretty obvious that it could
cause some issues during soft-stop if a large table, assuming it is
full prior to the soft-stop, suddenly sees most of its entries
becoming trashable because of the soft-stop.
Moreover, we should note that the call to stktable_trash_oldest() is
immediately followed by a call to pool_gc():
We know for sure that pool_gc(), as it involves malloc_trim() on
glibc, is rather expensive, and the more memory to reclaim,
the longer the call.
We need to ensure that both stktable_trash_oldest() + consequent
pool_gc() call both theoretically fit in a single task execution window
to avoid contention, and thus prevent the watchdog from being triggered.
To do this, we now allocate a "budget" for each purging attempt.
budget is maxed out to 32K, it means that each sticktable cleanup
attempt will trash at most 32K entries.
32K value is quite arbitrary here, and might need to be adjusted or
even deducted from other parameters if this fails to properly address
the issue without introducing new side-effects.
The goal is to find a good balance between the max duration of each
cleanup batch and the frequency of (expensive) pool_gc() calls.
If most of the budget is actually spent trashing entries, then the task
will immediately be rescheduled to continue the purge.
This way, the purge is effectively batched over multiple task runs.
This may be slowly backported to all stable versions.
[Please note that this commit depends on 6e1fe25 ("MINOR: proxy/pool:
prevent unnecessary calls to pool_gc()")]
2023-03-29 10:18:50 -04:00
int budget ;
int cleaned_up ;
/* We purposely enforce a budget limitation since we don't want
* to spend too much time purging old entries
*
* This is known to cause the watchdog to occasionnaly trigger if
* the table is huge and all entries become available for purge
* at the same time
*
* Moreover , we must also anticipate the pool_gc ( ) call which
* will also be much slower if there is too much work at once
*/
budget = MIN ( p - > table - > current , ( 1 < < 15 ) ) ; /* max: 32K */
cleaned_up = stktable_trash_oldest ( p - > table , budget ) ;
if ( cleaned_up ) {
/* immediately release freed memory since we are stopping */
2023-03-28 09:14:48 -04:00
pool_gc ( NULL ) ;
BUG/MEDIUM: proxy/sktable: prevent watchdog trigger on soft-stop
During soft-stop, manage_proxy() (p->task) will try to purge
trashable (expired and not referenced) sticktable entries,
effectively releasing the process memory to leave some space
for new processes.
This is done by calling stktable_trash_oldest(), immediately
followed by a pool_gc() to give the memory back to the OS.
As already mentioned in dfe7925 ("BUG/MEDIUM: stick-table:
limit the time spent purging old entries"), calling
stktable_trash_oldest() with a huge batch can result in the function
spending too much time searching and purging entries, and ultimately
triggering the watchdog.
Lately, an internal issue was reported in which we could see
that the watchdog is being triggered in stktable_trash_oldest()
on soft-stop (thus initiated by manage_proxy())
According to the report, the crash seems to only occur since 5938021
("BUG/MEDIUM: stick-table: do not leave entries in end of window during purge")
This could be the result of stktable_trash_oldest() now working
as expected, and thus spending a large amount of time purging
entries when called with a large enough <to_batch>.
Instead of adding new checks in stktable_trash_oldest(), here we
chose to address the issue directly in manage_proxy().
Since the stktable_trash_oldest() function is called with
<to_batch> == <p->table->current>, it's pretty obvious that it could
cause some issues during soft-stop if a large table, assuming it is
full prior to the soft-stop, suddenly sees most of its entries
becoming trashable because of the soft-stop.
Moreover, we should note that the call to stktable_trash_oldest() is
immediately followed by a call to pool_gc():
We know for sure that pool_gc(), as it involves malloc_trim() on
glibc, is rather expensive, and the more memory to reclaim,
the longer the call.
We need to ensure that both stktable_trash_oldest() + consequent
pool_gc() call both theoretically fit in a single task execution window
to avoid contention, and thus prevent the watchdog from being triggered.
To do this, we now allocate a "budget" for each purging attempt.
budget is maxed out to 32K, it means that each sticktable cleanup
attempt will trash at most 32K entries.
32K value is quite arbitrary here, and might need to be adjusted or
even deducted from other parameters if this fails to properly address
the issue without introducing new side-effects.
The goal is to find a good balance between the max duration of each
cleanup batch and the frequency of (expensive) pool_gc() calls.
If most of the budget is actually spent trashing entries, then the task
will immediately be rescheduled to continue the purge.
This way, the purge is effectively batched over multiple task runs.
This may be slowly backported to all stable versions.
[Please note that this commit depends on 6e1fe25 ("MINOR: proxy/pool:
prevent unnecessary calls to pool_gc()")]
2023-03-29 10:18:50 -04:00
if ( cleaned_up > ( budget / 2 ) ) {
/* most of the budget was used to purge entries,
* it is very likely that there are still trashable
* entries in the table , reschedule a new cleanup
* attempt ASAP
*/
t - > expire = TICK_ETERNITY ;
task_wakeup ( t , TASK_WOKEN_RES ) ;
return t ;
}
}
2013-09-04 11:54:01 -04:00
}
2019-03-14 02:07:41 -04:00
if ( p - > table - > current ) {
BUG/MEDIUM: proxy/sktable: prevent watchdog trigger on soft-stop
During soft-stop, manage_proxy() (p->task) will try to purge
trashable (expired and not referenced) sticktable entries,
effectively releasing the process memory to leave some space
for new processes.
This is done by calling stktable_trash_oldest(), immediately
followed by a pool_gc() to give the memory back to the OS.
As already mentioned in dfe7925 ("BUG/MEDIUM: stick-table:
limit the time spent purging old entries"), calling
stktable_trash_oldest() with a huge batch can result in the function
spending too much time searching and purging entries, and ultimately
triggering the watchdog.
Lately, an internal issue was reported in which we could see
that the watchdog is being triggered in stktable_trash_oldest()
on soft-stop (thus initiated by manage_proxy())
According to the report, the crash seems to only occur since 5938021
("BUG/MEDIUM: stick-table: do not leave entries in end of window during purge")
This could be the result of stktable_trash_oldest() now working
as expected, and thus spending a large amount of time purging
entries when called with a large enough <to_batch>.
Instead of adding new checks in stktable_trash_oldest(), here we
chose to address the issue directly in manage_proxy().
Since the stktable_trash_oldest() function is called with
<to_batch> == <p->table->current>, it's pretty obvious that it could
cause some issues during soft-stop if a large table, assuming it is
full prior to the soft-stop, suddenly sees most of its entries
becoming trashable because of the soft-stop.
Moreover, we should note that the call to stktable_trash_oldest() is
immediately followed by a call to pool_gc():
We know for sure that pool_gc(), as it involves malloc_trim() on
glibc, is rather expensive, and the more memory to reclaim,
the longer the call.
We need to ensure that both stktable_trash_oldest() + consequent
pool_gc() call both theoretically fit in a single task execution window
to avoid contention, and thus prevent the watchdog from being triggered.
To do this, we now allocate a "budget" for each purging attempt.
budget is maxed out to 32K, it means that each sticktable cleanup
attempt will trash at most 32K entries.
32K value is quite arbitrary here, and might need to be adjusted or
even deducted from other parameters if this fails to properly address
the issue without introducing new side-effects.
The goal is to find a good balance between the max duration of each
cleanup batch and the frequency of (expensive) pool_gc() calls.
If most of the budget is actually spent trashing entries, then the task
will immediately be rescheduled to continue the purge.
This way, the purge is effectively batched over multiple task runs.
This may be slowly backported to all stable versions.
[Please note that this commit depends on 6e1fe25 ("MINOR: proxy/pool:
prevent unnecessary calls to pool_gc()")]
2023-03-29 10:18:50 -04:00
/* some entries still remain but are not yet available
* for cleanup , let ' s recheck in one second
*/
2013-09-04 11:54:01 -04:00
next = tick_first ( next , tick_add ( now_ms , 1000 ) ) ;
}
}
2011-07-25 10:33:49 -04:00
/* the rest below is just for frontends */
if ( ! ( p - > cap & PR_CAP_FE ) )
goto out ;
2011-07-25 01:37:28 -04:00
2011-07-25 10:33:49 -04:00
/* check the various reasons we may find to block the frontend */
2020-09-24 01:35:46 -04:00
if ( unlikely ( p - > feconn > = p - > maxconn ) )
2011-07-25 10:33:49 -04:00
goto out ;
2009-03-05 17:48:25 -05:00
2011-07-25 10:33:49 -04:00
if ( p - > fe_sps_lim & &
( wait = next_event_delay ( & p - > fe_sess_per_sec , p - > fe_sps_lim , 0 ) ) ) {
/* we're blocking because a limit was reached on the number of
* requests / s on the frontend . We want to re - check ASAP , which
* means in 1 ms before estimated expiration date , because the
* timer will have settled down .
*/
next = tick_first ( next , tick_add ( now_ms , wait ) ) ;
goto out ;
2006-06-25 20:48:02 -04:00
}
2011-07-25 10:33:49 -04:00
/* The proxy is not limited so we can re-enable any waiting listener */
2019-12-10 08:10:52 -05:00
dequeue_proxy_listeners ( p ) ;
2011-07-25 10:33:49 -04:00
out :
t - > expire = next ;
task_queue ( t ) ;
return t ;
2006-06-25 20:48:02 -04:00
}
2021-09-07 04:49:45 -04:00
static int proxy_parse_grace ( char * * args , int section_type , struct proxy * curpx ,
const struct proxy * defpx , const char * file , int line ,
char * * err )
{
const char * res ;
if ( ! * args [ 1 ] ) {
memprintf ( err , " '%s' expects <time> as argument. \n " , args [ 0 ] ) ;
return - 1 ;
}
res = parse_time_err ( args [ 1 ] , & global . grace_delay , TIME_UNIT_MS ) ;
if ( res = = PARSE_TIME_OVER ) {
memprintf ( err , " timer overflow in argument '%s' to '%s' (maximum value is 2147483647 ms or ~24.8 days) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res = = PARSE_TIME_UNDER ) {
memprintf ( err , " timer underflow in argument '%s' to '%s' (minimum non-null value is 1 ms) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res ) {
memprintf ( err , " unexpected character '%c' in argument to <%s>. \n " , * res , args [ 0 ] ) ;
return - 1 ;
}
return 0 ;
}
2017-03-23 17:44:13 -04:00
static int proxy_parse_hard_stop_after ( char * * args , int section_type , struct proxy * curpx ,
2021-03-09 03:53:46 -05:00
const struct proxy * defpx , const char * file , int line ,
2017-03-23 17:44:13 -04:00
char * * err )
{
const char * res ;
if ( ! * args [ 1 ] ) {
memprintf ( err , " '%s' expects <time> as argument. \n " , args [ 0 ] ) ;
return - 1 ;
}
res = parse_time_err ( args [ 1 ] , & global . hard_stop_after , TIME_UNIT_MS ) ;
2019-06-07 13:00:37 -04:00
if ( res = = PARSE_TIME_OVER ) {
memprintf ( err , " timer overflow in argument '%s' to '%s' (maximum value is 2147483647 ms or ~24.8 days) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res = = PARSE_TIME_UNDER ) {
memprintf ( err , " timer underflow in argument '%s' to '%s' (minimum non-null value is 1 ms) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res ) {
2017-03-23 17:44:13 -04:00
memprintf ( err , " unexpected character '%c' in argument to <%s>. \n " , * res , args [ 0 ] ) ;
return - 1 ;
}
return 0 ;
}
MEDIUM: global: Add a "close-spread-time" option to spread soft-stop on time window
The new 'close-spread-time' global option can be used to spread idle and
active HTTP connction closing after a SIGUSR1 signal is received. This
allows to limit bursts of reconnections when too many idle connections
are closed at once. Indeed, without this new mechanism, in case of
soft-stop, all the idle connections would be closed at once (after the
grace period is over), and all active HTTP connections would be closed
by appending a "Connection: close" header to the next response that goes
over it (or via a GOAWAY frame in case of HTTP2).
This patch adds the support of this new option for HTTP as well as HTTP2
connections. It works differently on active and idle connections.
On active connections, instead of sending systematically the GOAWAY
frame or adding the 'Connection: close' header like before once the
soft-stop has started, a random based on the remainder of the close
window is calculated, and depending on its result we could decide to
keep the connection alive. The random will be recalculated for any
subsequent request/response on this connection so the GOAWAY will still
end up being sent, but we might wait a few more round trips. This will
ensure that goaways are distributed along a longer time window than
before.
On idle connections, a random factor is used when determining the expire
field of the connection's task, which should naturally spread connection
closings on the time window (see h2c_update_timeout).
This feature request was described in GitHub issue #1614.
This patch should be backported to 2.5. It depends on "BUG/MEDIUM:
mux-h2: make use of http-request and keep-alive timeouts" which
refactorized the timeout management of HTTP2 connections.
2022-04-08 12:04:18 -04:00
static int proxy_parse_close_spread_time ( char * * args , int section_type , struct proxy * curpx ,
const struct proxy * defpx , const char * file , int line ,
char * * err )
{
const char * res ;
if ( ! * args [ 1 ] ) {
memprintf ( err , " '%s' expects <time> as argument. \n " , args [ 0 ] ) ;
return - 1 ;
}
2022-04-26 09:17:18 -04:00
/* If close-spread-time is set to "infinite", disable the active connection
* closing during soft - stop .
*/
if ( strcmp ( args [ 1 ] , " infinite " ) = = 0 ) {
global . tune . options | = GTUNE_DISABLE_ACTIVE_CLOSE ;
global . close_spread_time = TICK_ETERNITY ;
return 0 ;
}
MEDIUM: global: Add a "close-spread-time" option to spread soft-stop on time window
The new 'close-spread-time' global option can be used to spread idle and
active HTTP connction closing after a SIGUSR1 signal is received. This
allows to limit bursts of reconnections when too many idle connections
are closed at once. Indeed, without this new mechanism, in case of
soft-stop, all the idle connections would be closed at once (after the
grace period is over), and all active HTTP connections would be closed
by appending a "Connection: close" header to the next response that goes
over it (or via a GOAWAY frame in case of HTTP2).
This patch adds the support of this new option for HTTP as well as HTTP2
connections. It works differently on active and idle connections.
On active connections, instead of sending systematically the GOAWAY
frame or adding the 'Connection: close' header like before once the
soft-stop has started, a random based on the remainder of the close
window is calculated, and depending on its result we could decide to
keep the connection alive. The random will be recalculated for any
subsequent request/response on this connection so the GOAWAY will still
end up being sent, but we might wait a few more round trips. This will
ensure that goaways are distributed along a longer time window than
before.
On idle connections, a random factor is used when determining the expire
field of the connection's task, which should naturally spread connection
closings on the time window (see h2c_update_timeout).
This feature request was described in GitHub issue #1614.
This patch should be backported to 2.5. It depends on "BUG/MEDIUM:
mux-h2: make use of http-request and keep-alive timeouts" which
refactorized the timeout management of HTTP2 connections.
2022-04-08 12:04:18 -04:00
res = parse_time_err ( args [ 1 ] , & global . close_spread_time , TIME_UNIT_MS ) ;
if ( res = = PARSE_TIME_OVER ) {
memprintf ( err , " timer overflow in argument '%s' to '%s' (maximum value is 2147483647 ms or ~24.8 days) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res = = PARSE_TIME_UNDER ) {
memprintf ( err , " timer underflow in argument '%s' to '%s' (minimum non-null value is 1 ms) " ,
args [ 1 ] , args [ 0 ] ) ;
return - 1 ;
}
else if ( res ) {
memprintf ( err , " unexpected character '%c' in argument to <%s>. \n " , * res , args [ 0 ] ) ;
return - 1 ;
}
2022-04-26 09:17:18 -04:00
global . tune . options & = ~ GTUNE_DISABLE_ACTIVE_CLOSE ;
MEDIUM: global: Add a "close-spread-time" option to spread soft-stop on time window
The new 'close-spread-time' global option can be used to spread idle and
active HTTP connction closing after a SIGUSR1 signal is received. This
allows to limit bursts of reconnections when too many idle connections
are closed at once. Indeed, without this new mechanism, in case of
soft-stop, all the idle connections would be closed at once (after the
grace period is over), and all active HTTP connections would be closed
by appending a "Connection: close" header to the next response that goes
over it (or via a GOAWAY frame in case of HTTP2).
This patch adds the support of this new option for HTTP as well as HTTP2
connections. It works differently on active and idle connections.
On active connections, instead of sending systematically the GOAWAY
frame or adding the 'Connection: close' header like before once the
soft-stop has started, a random based on the remainder of the close
window is calculated, and depending on its result we could decide to
keep the connection alive. The random will be recalculated for any
subsequent request/response on this connection so the GOAWAY will still
end up being sent, but we might wait a few more round trips. This will
ensure that goaways are distributed along a longer time window than
before.
On idle connections, a random factor is used when determining the expire
field of the connection's task, which should naturally spread connection
closings on the time window (see h2c_update_timeout).
This feature request was described in GitHub issue #1614.
This patch should be backported to 2.5. It depends on "BUG/MEDIUM:
mux-h2: make use of http-request and keep-alive timeouts" which
refactorized the timeout management of HTTP2 connections.
2022-04-08 12:04:18 -04:00
return 0 ;
}
2021-03-02 10:09:26 -05:00
struct task * hard_stop ( struct task * t , void * context , unsigned int state )
2017-03-23 17:44:13 -04:00
{
struct proxy * p ;
struct stream * s ;
2021-02-24 05:13:59 -05:00
int thr ;
2017-03-23 17:44:13 -04:00
if ( killed ) {
2017-11-24 10:50:31 -05:00
ha_warning ( " Some tasks resisted to hard-stop, exiting now. \n " ) ;
2017-03-23 17:44:13 -04:00
send_log ( NULL , LOG_WARNING , " Some tasks resisted to hard-stop, exiting now. \n " ) ;
2019-06-02 05:11:29 -04:00
killed = 2 ;
2021-02-24 05:13:59 -05:00
for ( thr = 0 ; thr < global . nbthread ; thr + + )
2023-01-19 13:14:18 -05:00
if ( _HA_ATOMIC_LOAD ( & ha_thread_info [ thr ] . tg - > threads_enabled ) & ha_thread_info [ thr ] . ltid_bit )
2021-02-24 05:13:59 -05:00
wake_thread ( thr ) ;
2019-06-02 05:11:29 -04:00
t - > expire = TICK_ETERNITY ;
return t ;
2017-03-23 17:44:13 -04:00
}
2017-11-24 10:50:31 -05:00
ha_warning ( " soft-stop running for too long, performing a hard-stop. \n " ) ;
2017-03-23 17:44:13 -04:00
send_log ( NULL , LOG_WARNING , " soft-stop running for too long, performing a hard-stop. \n " ) ;
2017-11-24 10:54:05 -05:00
p = proxies_list ;
2017-03-23 17:44:13 -04:00
while ( p ) {
if ( ( p - > cap & PR_CAP_FE ) & & ( p - > feconn > 0 ) ) {
2017-11-24 10:50:31 -05:00
ha_warning ( " Proxy %s hard-stopped (%d remaining conns will be closed). \n " ,
p - > id , p - > feconn ) ;
2017-03-23 17:44:13 -04:00
send_log ( p , LOG_WARNING , " Proxy %s hard-stopped (%d remaining conns will be closed). \n " ,
p - > id , p - > feconn ) ;
}
p = p - > next ;
}
2021-02-24 05:08:56 -05:00
thread_isolate ( ) ;
2021-02-24 04:37:01 -05:00
for ( thr = 0 ; thr < global . nbthread ; thr + + ) {
2021-09-30 13:02:18 -04:00
list_for_each_entry ( s , & ha_thread_ctx [ thr ] . streams , list ) {
2021-02-24 04:37:01 -05:00
stream_shutdown ( s , SF_ERR_KILLED ) ;
}
2017-03-23 17:44:13 -04:00
}
2021-02-24 04:37:01 -05:00
2021-02-24 05:08:56 -05:00
thread_release ( ) ;
2017-03-23 17:44:13 -04:00
killed = 1 ;
t - > expire = tick_add ( now_ms , MS_TO_TICKS ( 1000 ) ) ;
return t ;
}
2021-09-07 04:49:45 -04:00
/* perform the soft-stop right now (i.e. unbind listeners) */
static void do_soft_stop_now ( )
2006-06-25 20:48:02 -04:00
{
2023-03-14 09:33:11 -04:00
struct proxy * p ;
2017-03-23 17:44:13 -04:00
struct task * task ;
2006-06-25 20:48:02 -04:00
2019-12-28 09:36:02 -05:00
/* disable busy polling to avoid cpu eating for the new process */
global . tune . options & = ~ GTUNE_BUSY_POLLING ;
2021-09-07 04:49:45 -04:00
MEDIUM: global: Add a "close-spread-time" option to spread soft-stop on time window
The new 'close-spread-time' global option can be used to spread idle and
active HTTP connction closing after a SIGUSR1 signal is received. This
allows to limit bursts of reconnections when too many idle connections
are closed at once. Indeed, without this new mechanism, in case of
soft-stop, all the idle connections would be closed at once (after the
grace period is over), and all active HTTP connections would be closed
by appending a "Connection: close" header to the next response that goes
over it (or via a GOAWAY frame in case of HTTP2).
This patch adds the support of this new option for HTTP as well as HTTP2
connections. It works differently on active and idle connections.
On active connections, instead of sending systematically the GOAWAY
frame or adding the 'Connection: close' header like before once the
soft-stop has started, a random based on the remainder of the close
window is calculated, and depending on its result we could decide to
keep the connection alive. The random will be recalculated for any
subsequent request/response on this connection so the GOAWAY will still
end up being sent, but we might wait a few more round trips. This will
ensure that goaways are distributed along a longer time window than
before.
On idle connections, a random factor is used when determining the expire
field of the connection's task, which should naturally spread connection
closings on the time window (see h2c_update_timeout).
This feature request was described in GitHub issue #1614.
This patch should be backported to 2.5. It depends on "BUG/MEDIUM:
mux-h2: make use of http-request and keep-alive timeouts" which
refactorized the timeout management of HTTP2 connections.
2022-04-08 12:04:18 -04:00
if ( tick_isset ( global . close_spread_time ) ) {
global . close_spread_end = tick_add ( now_ms , global . close_spread_time ) ;
}
2021-09-07 04:49:45 -04:00
/* schedule a hard-stop after a delay if needed */
2017-03-23 17:44:13 -04:00
if ( tick_isset ( global . hard_stop_after ) ) {
2021-10-01 12:23:30 -04:00
task = task_new_anywhere ( ) ;
2017-03-23 17:44:13 -04:00
if ( task ) {
task - > process = hard_stop ;
task_schedule ( task , tick_add ( now_ms , global . hard_stop_after ) ) ;
}
else {
2017-11-24 10:50:31 -05:00
ha_alert ( " out of memory trying to allocate the hard-stop task. \n " ) ;
2017-03-23 17:44:13 -04:00
}
}
2020-10-07 10:52:43 -04:00
2022-07-15 13:15:02 -04:00
/* we isolate so that we have a chance of stopping listeners in other groups */
thread_isolate ( ) ;
2021-06-11 10:27:10 -04:00
/* stop all stoppable listeners */
2020-10-07 10:52:43 -04:00
protocol_stop_now ( ) ;
2022-07-15 13:15:02 -04:00
thread_release ( ) ;
2023-03-14 09:33:11 -04:00
/* Loop on proxies to stop backends */
p = proxies_list ;
while ( p ) {
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & p - > lock ) ;
proxy_cond_disable ( p ) ;
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & p - > lock ) ;
p = p - > next ;
}
2010-08-27 12:26:11 -04:00
/* signal zero is used to broadcast the "stopping" event */
signal_handler ( 0 ) ;
2006-06-25 20:48:02 -04:00
}
2021-09-07 04:49:45 -04:00
/* triggered by a soft-stop delayed with `grace` */
static struct task * grace_expired ( struct task * t , void * context , unsigned int state )
{
ha_notice ( " Grace period expired, proceeding with soft-stop now. \n " ) ;
send_log ( NULL , LOG_NOTICE , " Grace period expired, proceeding with soft-stop now. \n " ) ;
do_soft_stop_now ( ) ;
task_destroy ( t ) ;
return NULL ;
}
/*
* this function disables health - check servers so that the process will quickly be ignored
* by load balancers .
*/
void soft_stop ( void )
{
struct task * task ;
stopping = 1 ;
if ( tick_isset ( global . grace_delay ) ) {
2021-10-01 12:23:30 -04:00
task = task_new_anywhere ( ) ;
2021-09-07 04:49:45 -04:00
if ( task ) {
ha_notice ( " Scheduling a soft-stop in %u ms. \n " , global . grace_delay ) ;
send_log ( NULL , LOG_WARNING , " Scheduling a soft-stop in %u ms. \n " , global . grace_delay ) ;
task - > process = grace_expired ;
task_schedule ( task , tick_add ( now_ms , global . grace_delay ) ) ;
return ;
}
else {
ha_alert ( " out of memory trying to allocate the stop-stop task, stopping now. \n " ) ;
}
}
/* no grace (or failure to enforce it): stop now */
do_soft_stop_now ( ) ;
}
2006-06-25 20:48:02 -04:00
2011-07-24 12:28:10 -04:00
/* Temporarily disables listening on all of the proxy's listeners. Upon
2020-09-24 01:44:34 -04:00
* success , the proxy enters the PR_PAUSED state . The function returns 0
2011-09-07 13:14:57 -04:00
* if it fails , or non - zero on success .
2022-09-08 08:35:35 -04:00
* The function takes the proxy ' s lock so it ' s safe to
* call from multiple places .
2006-06-25 20:48:02 -04:00
*/
2011-09-07 13:14:57 -04:00
int pause_proxy ( struct proxy * p )
2006-06-25 20:48:02 -04:00
{
struct listener * l ;
2011-09-07 13:14:57 -04:00
2022-09-08 08:35:35 -04:00
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & p - > lock ) ;
2021-10-06 08:24:19 -04:00
if ( ! ( p - > cap & PR_CAP_FE ) | | ( p - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) ) | | ! p - > li_ready )
2022-09-08 08:35:35 -04:00
goto end ;
2011-09-07 13:14:57 -04:00
2020-09-24 01:44:34 -04:00
list_for_each_entry ( l , & p - > conf . listeners , by_fe )
MINOR: listener: pause_listener() becomes suspend_listener()
We are simply renaming pause_listener() to suspend_listener() to prevent
confusion around listener pausing.
A suspended listener can be in two differents valid states:
- LI_PAUSED: the listener is effectively paused, it will unpause on
resume_listener()
- LI_ASSIGNED (not bound): the listener does not support the LI_PAUSED
state, so it was unbound to satisfy the suspend request, it will
correcly re-bind on resume_listener()
Besides that, we add the LI_F_SUSPENDED flag to mark suspended listeners in
suspend_listener() and unmark them in resume_listener().
We're also adding li_suspend proxy variable to track the number of currently
suspended listeners:
That is, the number of listeners that were suspended through suspend_listener()
and that are either in LI_PAUSED or LI_ASSIGNED state.
Counter is increased on successful suspend in suspend_listener() and it is
decreased on successful resume in resume_listener()
--
Backport notes:
-> 2.4 only, as "MINOR: proxy/listener: support for additional PAUSED state"
was not backported:
Replace this:
| /* PROXY_LOCK is require
| proxy_cond_resume(px);
By this:
| ha_warning("Resumed %s %s.\n", proxy_cap_str(px->cap), px->id);
| send_log(px, LOG_WARNING, "Resumed %s %s.\n", proxy_cap_str(px->cap), px->id);
-> 2.6 and 2.7 only, as "MINOR: listener: make sure we don't pause/resume" was
custom patched:
Replace this:
|@@ -253,6 +253,7 @@ struct listener {
|
| /* listener flags (16 bits) */
| #define LI_F_FINALIZED 0x0001 /* listener made it to the READY||LIMITED||FULL state at least once, may be suspended/resumed safely */
|+#define LI_F_SUSPENDED 0x0002 /* listener has been suspended using suspend_listener(), it is either is LI_PAUSED or LI_ASSIGNED state */
|
| /* Descriptor for a "bind" keyword. The ->parse() function returns 0 in case of
| * success, or a combination of ERR_* flags if an error is encountered. The
By this:
|@@ -222,6 +222,7 @@ struct li_per_thread {
|
| #define LI_F_QUIC_LISTENER 0x00000001 /* listener uses proto quic */
| #define LI_F_FINALIZED 0x00000002 /* listener made it to the READY||LIMITED||FULL state at least once, may be suspended/resumed safely */
|+#define LI_F_SUSPENDED 0x00000004 /* listener has been suspended using suspend_listener(), it is either is LI_PAUSED or LI_ASSIGNED state */
|
| /* The listener will be directly referenced by the fdtab[] which holds its
| * socket. The listener provides the protocol-specific accept() function to
2023-02-13 11:45:08 -05:00
suspend_listener ( l , 1 , 0 ) ;
2011-09-07 13:14:57 -04:00
2020-09-24 01:44:34 -04:00
if ( p - > li_ready ) {
2017-11-24 10:50:31 -05:00
ha_warning ( " %s %s failed to enter pause mode. \n " , proxy_cap_str ( p - > cap ) , p - > id ) ;
2011-09-07 13:14:57 -04:00
send_log ( p , LOG_WARNING , " %s %s failed to enter pause mode. \n " , proxy_cap_str ( p - > cap ) , p - > id ) ;
2022-09-08 08:35:35 -04:00
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & p - > lock ) ;
2011-09-07 13:14:57 -04:00
return 0 ;
}
2022-09-08 08:35:35 -04:00
end :
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & p - > lock ) ;
2011-09-07 13:14:57 -04:00
return 1 ;
2008-10-12 06:07:48 -04:00
}
/*
* This function completely stops a proxy and releases its listeners . It has
* to be called when going down in order to release the ports so that another
* process may bind to them . It must also be called on disabled proxies at the
2018-11-16 10:57:21 -05:00
* end of start - up . If all listeners are closed , the proxy is set to the
2022-09-08 08:35:35 -04:00
* PR_STOPPED state .
* The function takes the proxy ' s lock so it ' s safe to
2019-07-24 11:42:44 -04:00
* call from multiple places .
2008-10-12 06:07:48 -04:00
*/
void stop_proxy ( struct proxy * p )
{
struct listener * l ;
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & p - > lock ) ;
2019-07-24 11:42:44 -04:00
2020-10-07 10:20:34 -04:00
list_for_each_entry ( l , & p - > conf . listeners , by_fe )
MINOR: listener/api: add lli hint to listener functions
Add listener lock hint (AKA lli) to (stop/resume/pause)_listener() functions.
All these functions implicitely take the listener lock when they are called:
It could be useful to be able to call them while already holding the lock, so
we're adding lli hint to make them take the lock only when it is missing.
This should only be backported if explicitly required by another commit
--
-> 2.4 and 2.5 common backport notes:
These 2 commits need to be backported first:
- 187396e34 "CLEANUP: listener: function comment typo in stop_listener()"
- a57786e87 "BUG/MINOR: listener: null pointer dereference suspected by
coverity"
-> 2.4 special backport notes:
In addition to the previously mentionned dependencies, the patch needs to be
slightly adapted to match the corresponding contextual lines:
Replace this:
|@@ -471,7 +474,8 @@ int pause_listener(struct listener *l, int lpx)
| if (!lpx && px)
| HA_RWLOCK_WRLOCK(PROXY_LOCK, &px->lock);
|
|- HA_RWLOCK_WRLOCK(LISTENER_LOCK, &l->lock);
|+ if (!lli)
|+ HA_RWLOCK_WRLOCK(LISTENER_LOCK, &l->lock);
|
| if (l->state <= LI_PAUSED)
| goto end;
By this:
|@@ -471,7 +474,8 @@ int pause_listener(struct listener *l, int lpx)
| if (!lpx && px)
| HA_RWLOCK_WRLOCK(PROXY_LOCK, &px->lock);
|
|- HA_RWLOCK_WRLOCK(LISTENER_LOCK, &l->lock);
|+ if (!lli)
|+ HA_RWLOCK_WRLOCK(LISTENER_LOCK, &l->lock);
|
| if ((global.mode & (MODE_DAEMON | MODE_MWORKER)) &&
| !(proc_mask(l->rx.settings->bind_proc) & pid_bit))
Replace this:
|@@ -169,7 +169,7 @@ void protocol_stop_now(void)
| HA_SPIN_LOCK(PROTO_LOCK, &proto_lock);
| list_for_each_entry(proto, &protocols, list) {
| list_for_each_entry_safe(listener, lback, &proto->receivers, rx.proto_list)
|- stop_listener(listener, 0, 1);
|+ stop_listener(listener, 0, 1, 0);
| }
| HA_SPIN_UNLOCK(PROTO_LOCK, &proto_lock);
| }
By this:
|@@ -169,7 +169,7 @@ void protocol_stop_now(void)
| HA_SPIN_LOCK(PROTO_LOCK, &proto_lock);
| list_for_each_entry(proto, &protocols, list) {
| list_for_each_entry_safe(listener, lback, &proto->receivers, rx.proto_list)
| if (!listener->bind_conf->frontend->grace)
|- stop_listener(listener, 0, 1);
|+ stop_listener(listener, 0, 1, 0);
| }
| HA_SPIN_UNLOCK(PROTO_LOCK, &proto_lock);
Replace this:
|@@ -2315,7 +2315,7 @@ void stop_proxy(struct proxy *p)
| HA_RWLOCK_WRLOCK(PROXY_LOCK, &p->lock);
|
| list_for_each_entry(l, &p->conf.listeners, by_fe)
|- stop_listener(l, 1, 0);
|+ stop_listener(l, 1, 0, 0);
|
| if (!(p->flags & (PR_FL_DISABLED|PR_FL_STOPPED)) && !p->li_ready) {
| /* might be just a backend */
By this:
|@@ -2315,7 +2315,7 @@ void stop_proxy(struct proxy *p)
| HA_RWLOCK_WRLOCK(PROXY_LOCK, &p->lock);
|
| list_for_each_entry(l, &p->conf.listeners, by_fe)
|- stop_listener(l, 1, 0);
|+ stop_listener(l, 1, 0, 0);
|
| if (!p->disabled && !p->li_ready) {
| /* might be just a backend */
2023-02-06 11:06:03 -05:00
stop_listener ( l , 1 , 0 , 0 ) ;
2019-07-24 11:42:44 -04:00
2021-10-06 08:24:19 -04:00
if ( ! ( p - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) ) & & ! p - > li_ready ) {
2020-10-16 09:10:11 -04:00
/* might be just a backend */
2021-10-06 08:24:19 -04:00
p - > flags | = PR_FL_STOPPED ;
2020-10-16 09:10:11 -04:00
}
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & p - > lock ) ;
2006-06-25 20:48:02 -04:00
}
2011-09-07 15:33:14 -04:00
/* This function resumes listening on the specified proxy. It scans all of its
* listeners and tries to enable them all . If any of them fails , the proxy is
* put back to the paused state . It returns 1 upon success , or zero if an error
* is encountered .
2022-09-08 08:35:35 -04:00
* The function takes the proxy ' s lock so it ' s safe to
* call from multiple places .
2011-09-07 15:33:14 -04:00
*/
int resume_proxy ( struct proxy * p )
{
struct listener * l ;
int fail ;
2022-09-08 08:35:35 -04:00
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & p - > lock ) ;
2021-10-06 08:24:19 -04:00
if ( ( p - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) ) | | ! p - > li_paused )
2022-09-08 08:35:35 -04:00
goto end ;
2011-09-07 15:33:14 -04:00
fail = 0 ;
2012-09-20 10:48:07 -04:00
list_for_each_entry ( l , & p - > conf . listeners , by_fe ) {
MINOR: listener/api: add lli hint to listener functions
Add listener lock hint (AKA lli) to (stop/resume/pause)_listener() functions.
All these functions implicitely take the listener lock when they are called:
It could be useful to be able to call them while already holding the lock, so
we're adding lli hint to make them take the lock only when it is missing.
This should only be backported if explicitly required by another commit
--
-> 2.4 and 2.5 common backport notes:
These 2 commits need to be backported first:
- 187396e34 "CLEANUP: listener: function comment typo in stop_listener()"
- a57786e87 "BUG/MINOR: listener: null pointer dereference suspected by
coverity"
-> 2.4 special backport notes:
In addition to the previously mentionned dependencies, the patch needs to be
slightly adapted to match the corresponding contextual lines:
Replace this:
|@@ -471,7 +474,8 @@ int pause_listener(struct listener *l, int lpx)
| if (!lpx && px)
| HA_RWLOCK_WRLOCK(PROXY_LOCK, &px->lock);
|
|- HA_RWLOCK_WRLOCK(LISTENER_LOCK, &l->lock);
|+ if (!lli)
|+ HA_RWLOCK_WRLOCK(LISTENER_LOCK, &l->lock);
|
| if (l->state <= LI_PAUSED)
| goto end;
By this:
|@@ -471,7 +474,8 @@ int pause_listener(struct listener *l, int lpx)
| if (!lpx && px)
| HA_RWLOCK_WRLOCK(PROXY_LOCK, &px->lock);
|
|- HA_RWLOCK_WRLOCK(LISTENER_LOCK, &l->lock);
|+ if (!lli)
|+ HA_RWLOCK_WRLOCK(LISTENER_LOCK, &l->lock);
|
| if ((global.mode & (MODE_DAEMON | MODE_MWORKER)) &&
| !(proc_mask(l->rx.settings->bind_proc) & pid_bit))
Replace this:
|@@ -169,7 +169,7 @@ void protocol_stop_now(void)
| HA_SPIN_LOCK(PROTO_LOCK, &proto_lock);
| list_for_each_entry(proto, &protocols, list) {
| list_for_each_entry_safe(listener, lback, &proto->receivers, rx.proto_list)
|- stop_listener(listener, 0, 1);
|+ stop_listener(listener, 0, 1, 0);
| }
| HA_SPIN_UNLOCK(PROTO_LOCK, &proto_lock);
| }
By this:
|@@ -169,7 +169,7 @@ void protocol_stop_now(void)
| HA_SPIN_LOCK(PROTO_LOCK, &proto_lock);
| list_for_each_entry(proto, &protocols, list) {
| list_for_each_entry_safe(listener, lback, &proto->receivers, rx.proto_list)
| if (!listener->bind_conf->frontend->grace)
|- stop_listener(listener, 0, 1);
|+ stop_listener(listener, 0, 1, 0);
| }
| HA_SPIN_UNLOCK(PROTO_LOCK, &proto_lock);
Replace this:
|@@ -2315,7 +2315,7 @@ void stop_proxy(struct proxy *p)
| HA_RWLOCK_WRLOCK(PROXY_LOCK, &p->lock);
|
| list_for_each_entry(l, &p->conf.listeners, by_fe)
|- stop_listener(l, 1, 0);
|+ stop_listener(l, 1, 0, 0);
|
| if (!(p->flags & (PR_FL_DISABLED|PR_FL_STOPPED)) && !p->li_ready) {
| /* might be just a backend */
By this:
|@@ -2315,7 +2315,7 @@ void stop_proxy(struct proxy *p)
| HA_RWLOCK_WRLOCK(PROXY_LOCK, &p->lock);
|
| list_for_each_entry(l, &p->conf.listeners, by_fe)
|- stop_listener(l, 1, 0);
|+ stop_listener(l, 1, 0, 0);
|
| if (!p->disabled && !p->li_ready) {
| /* might be just a backend */
2023-02-06 11:06:03 -05:00
if ( ! resume_listener ( l , 1 , 0 ) ) {
2011-09-07 15:33:14 -04:00
int port ;
2020-08-27 01:48:42 -04:00
port = get_host_port ( & l - > rx . addr ) ;
2011-09-07 15:33:14 -04:00
if ( port ) {
2017-11-24 10:50:31 -05:00
ha_warning ( " Port %d busy while trying to enable %s %s. \n " ,
port , proxy_cap_str ( p - > cap ) , p - > id ) ;
2011-09-07 15:33:14 -04:00
send_log ( p , LOG_WARNING , " Port %d busy while trying to enable %s %s. \n " ,
port , proxy_cap_str ( p - > cap ) , p - > id ) ;
}
else {
2017-11-24 10:50:31 -05:00
ha_warning ( " Bind on socket %d busy while trying to enable %s %s. \n " ,
l - > luid , proxy_cap_str ( p - > cap ) , p - > id ) ;
2011-09-07 15:33:14 -04:00
send_log ( p , LOG_WARNING , " Bind on socket %d busy while trying to enable %s %s. \n " ,
l - > luid , proxy_cap_str ( p - > cap ) , p - > id ) ;
}
/* Another port might have been enabled. Let's stop everything. */
fail = 1 ;
break ;
}
}
if ( fail ) {
2022-09-08 08:35:35 -04:00
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & p - > lock ) ;
/* pause_proxy will take PROXY_LOCK */
2011-09-07 15:33:14 -04:00
pause_proxy ( p ) ;
return 0 ;
}
2022-09-08 08:35:35 -04:00
end :
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & p - > lock ) ;
2011-09-07 15:33:14 -04:00
return 1 ;
}
REORG/MAJOR: session: rename the "session" entity to "stream"
With HTTP/2, we'll have to support multiplexed streams. A stream is in
fact the largest part of what we currently call a session, it has buffers,
logs, etc.
In order to catch any error, this commit removes any reference to the
struct session and tries to rename most "session" occurrences in function
names to "stream" and "sess" to "strm" when that's related to a session.
The files stream.{c,h} were added and session.{c,h} removed.
The session will be reintroduced later and a few parts of the stream
will progressively be moved overthere. It will more or less contain
only what we need in an embryonic session.
Sample fetch functions and converters will have to change a bit so
that they'll use an L5 (session) instead of what's currently called
"L4" which is in fact L6 for now.
Once all changes are completed, we should see approximately this :
L7 - http_txn
L6 - stream
L5 - session
L4 - connection | applet
There will be at most one http_txn per stream, and a same session will
possibly be referenced by multiple streams. A connection will point to
a session and to a stream. The session will hold all the information
we need to keep even when we don't yet have a stream.
Some more cleanup is needed because some code was already far from
being clean. The server queue management still refers to sessions at
many places while comments talk about connections. This will have to
be cleaned up once we have a server-side connection pool manager.
Stream flags "SN_*" still need to be renamed, it doesn't seem like
any of them will need to move to the session.
2015-04-02 18:22:06 -04:00
/* Set current stream's backend to <be>. Nothing is done if the
* stream already had a backend assigned , which is indicated by
2015-04-02 19:14:29 -04:00
* s - > flags & SF_BE_ASSIGNED .
2009-07-07 09:10:31 -04:00
* All flags , stats and counters which need be updated are updated .
2009-07-12 02:27:39 -04:00
* Returns 1 if done , 0 in case of internal error , eg : lack of resource .
2009-07-07 09:10:31 -04:00
*/
REORG/MAJOR: session: rename the "session" entity to "stream"
With HTTP/2, we'll have to support multiplexed streams. A stream is in
fact the largest part of what we currently call a session, it has buffers,
logs, etc.
In order to catch any error, this commit removes any reference to the
struct session and tries to rename most "session" occurrences in function
names to "stream" and "sess" to "strm" when that's related to a session.
The files stream.{c,h} were added and session.{c,h} removed.
The session will be reintroduced later and a few parts of the stream
will progressively be moved overthere. It will more or less contain
only what we need in an embryonic session.
Sample fetch functions and converters will have to change a bit so
that they'll use an L5 (session) instead of what's currently called
"L4" which is in fact L6 for now.
Once all changes are completed, we should see approximately this :
L7 - http_txn
L6 - stream
L5 - session
L4 - connection | applet
There will be at most one http_txn per stream, and a same session will
possibly be referenced by multiple streams. A connection will point to
a session and to a stream. The session will hold all the information
we need to keep even when we don't yet have a stream.
Some more cleanup is needed because some code was already far from
being clean. The server queue management still refers to sessions at
many places while comments talk about connections. This will have to
be cleaned up once we have a server-side connection pool manager.
Stream flags "SN_*" still need to be renamed, it doesn't seem like
any of them will need to move to the session.
2015-04-02 18:22:06 -04:00
int stream_set_backend ( struct stream * s , struct proxy * be )
2009-07-07 09:10:31 -04:00
{
2021-03-15 05:42:02 -04:00
unsigned int req_ana ;
2015-04-02 19:14:29 -04:00
if ( s - > flags & SF_BE_ASSIGNED )
2009-07-12 02:27:39 -04:00
return 1 ;
2016-06-21 05:54:52 -04:00
if ( flt_set_stream_backend ( s , be ) < 0 )
return 0 ;
2009-07-07 09:10:31 -04:00
s - > be = be ;
2017-06-02 09:33:24 -04:00
HA_ATOMIC_UPDATE_MAX ( & be - > be_counters . conn_max ,
2021-04-06 05:44:07 -04:00
HA_ATOMIC_ADD_FETCH ( & be - > beconn , 1 ) ) ;
2009-07-07 09:10:31 -04:00
proxy_inc_be_ctr ( be ) ;
REORG/MAJOR: session: rename the "session" entity to "stream"
With HTTP/2, we'll have to support multiplexed streams. A stream is in
fact the largest part of what we currently call a session, it has buffers,
logs, etc.
In order to catch any error, this commit removes any reference to the
struct session and tries to rename most "session" occurrences in function
names to "stream" and "sess" to "strm" when that's related to a session.
The files stream.{c,h} were added and session.{c,h} removed.
The session will be reintroduced later and a few parts of the stream
will progressively be moved overthere. It will more or less contain
only what we need in an embryonic session.
Sample fetch functions and converters will have to change a bit so
that they'll use an L5 (session) instead of what's currently called
"L4" which is in fact L6 for now.
Once all changes are completed, we should see approximately this :
L7 - http_txn
L6 - stream
L5 - session
L4 - connection | applet
There will be at most one http_txn per stream, and a same session will
possibly be referenced by multiple streams. A connection will point to
a session and to a stream. The session will hold all the information
we need to keep even when we don't yet have a stream.
Some more cleanup is needed because some code was already far from
being clean. The server queue management still refers to sessions at
many places while comments talk about connections. This will have to
be cleaned up once we have a server-side connection pool manager.
Stream flags "SN_*" still need to be renamed, it doesn't seem like
any of them will need to move to the session.
2015-04-02 18:22:06 -04:00
/* assign new parameters to the stream from the new backend */
2022-05-17 13:44:42 -04:00
s - > scb - > flags & = ~ SC_FL_INDEP_STR ;
[MEDIUM] new option "independant-streams" to stop updating read timeout on writes
By default, when data is sent over a socket, both the write timeout and the
read timeout for that socket are refreshed, because we consider that there is
activity on that socket, and we have no other means of guessing if we should
receive data or not.
While this default behaviour is desirable for almost all applications, there
exists a situation where it is desirable to disable it, and only refresh the
read timeout if there are incoming data. This happens on sessions with large
timeouts and low amounts of exchanged data such as telnet session. If the
server suddenly disappears, the output data accumulates in the system's
socket buffers, both timeouts are correctly refreshed, and there is no way
to know the server does not receive them, so we don't timeout. However, when
the underlying protocol always echoes sent data, it would be enough by itself
to detect the issue using the read timeout. Note that this problem does not
happen with more verbose protocols because data won't accumulate long in the
socket buffers.
When this option is set on the frontend, it will disable read timeout updates
on data sent to the client. There probably is little use of this case. When
the option is set on the backend, it will disable read timeout updates on
data sent to the server. Doing so will typically break large HTTP posts from
slow lines, so use it with caution.
2009-10-03 16:01:18 -04:00
if ( be - > options2 & PR_O2_INDEPSTR )
2022-05-17 13:44:42 -04:00
s - > scb - > flags | = SC_FL_INDEP_STR ;
[MEDIUM] new option "independant-streams" to stop updating read timeout on writes
By default, when data is sent over a socket, both the write timeout and the
read timeout for that socket are refreshed, because we consider that there is
activity on that socket, and we have no other means of guessing if we should
receive data or not.
While this default behaviour is desirable for almost all applications, there
exists a situation where it is desirable to disable it, and only refresh the
read timeout if there are incoming data. This happens on sessions with large
timeouts and low amounts of exchanged data such as telnet session. If the
server suddenly disappears, the output data accumulates in the system's
socket buffers, both timeouts are correctly refreshed, and there is no way
to know the server does not receive them, so we don't timeout. However, when
the underlying protocol always echoes sent data, it would be enough by itself
to detect the issue using the read timeout. Note that this problem does not
happen with more verbose protocols because data won't accumulate long in the
socket buffers.
When this option is set on the frontend, it will disable read timeout updates
on data sent to the client. There probably is little use of this case. When
the option is set on the backend, it will disable read timeout updates on
data sent to the server. Doing so will typically break large HTTP posts from
slow lines, so use it with caution.
2009-10-03 16:01:18 -04:00
2015-05-01 16:42:08 -04:00
/* We want to enable the backend-specific analysers except those which
* were already run as part of the frontend / listener . Note that it would
* be more reliable to store the list of analysers that have been run ,
* but what we do here is OK for now .
*/
2021-03-15 05:42:02 -04:00
req_ana = be - > be_req_ana ;
if ( ! ( strm_fe ( s ) - > options & PR_O_WREQ_BODY ) & & be - > options & PR_O_WREQ_BODY ) {
/* The backend request to parse a request body while it was not
* performed on the frontend , so add the corresponding analyser
*/
req_ana | = AN_REQ_HTTP_BODY ;
}
if ( IS_HTX_STRM ( s ) & & strm_fe ( s ) - > mode ! = PR_MODE_HTTP ) {
/* The stream was already upgraded to HTTP, so remove analysers
* set during the upgrade
*/
req_ana & = ~ ( AN_REQ_WAIT_HTTP | AN_REQ_HTTP_PROCESS_FE ) ;
}
2023-01-12 12:39:42 -05:00
s - > req . analysers | = req_ana & ~ ( strm_li ( s ) ? strm_li ( s ) - > bind_conf - > analysers : 0 ) ;
2009-07-12 03:47:04 -04:00
2021-03-15 05:42:02 -04:00
if ( ! IS_HTX_STRM ( s ) & & be - > mode = = PR_MODE_HTTP ) {
2019-04-08 04:53:51 -04:00
/* If we chain a TCP frontend to an HTX backend, we must upgrade
* the client mux */
2021-03-15 07:03:44 -04:00
if ( ! stream_set_http_mode ( s , NULL ) )
2021-03-15 05:42:02 -04:00
return 0 ;
}
else if ( IS_HTX_STRM ( s ) & & be - > mode ! = PR_MODE_HTTP ) {
/* If a TCP backend is assgiend to an HTX stream, return an
* error . It may happens for a new stream on a previously
* upgraded connections . */
if ( ! ( s - > flags & SF_ERR_MASK ) )
s - > flags | = SF_ERR_INTERNAL ;
return 0 ;
}
else {
/* If the target backend requires HTTP processing, we have to allocate
* the HTTP transaction if we did not have one .
*/
if ( unlikely ( ! s - > txn & & be - > http_needed & & ! http_create_txn ( s ) ) )
2019-12-20 09:59:20 -05:00
return 0 ;
2015-04-03 17:46:31 -04:00
}
s - > flags | = SF_BE_ASSIGNED ;
2011-05-30 12:10:30 -04:00
if ( be - > options2 & PR_O2_NODELAY ) {
2023-03-17 10:38:18 -04:00
s - > scf - > flags | = SC_FL_SND_NEVERWAIT ;
s - > scb - > flags | = SC_FL_SND_NEVERWAIT ;
2011-05-30 12:10:30 -04:00
}
2009-07-12 02:27:39 -04:00
return 1 ;
2009-07-07 09:10:31 -04:00
}
2018-09-07 11:43:26 -04:00
/* Capture a bad request or response and archive it in the proxy's structure.
* It is relatively protocol - agnostic so it requires that a number of elements
* are passed :
* - < proxy > is the proxy where the error was detected and where the snapshot
* needs to be stored
2018-11-15 14:46:55 -05:00
* - < is_back > indicates that the error happened when receiving the response
2018-09-07 11:43:26 -04:00
* - < other_end > is a pointer to the proxy on the other side when known
* - < target > is the target of the connection , usually a server or a proxy
* - < sess > is the session which experienced the error
* - < ctx > may be NULL or should contain any info relevant to the protocol
* - < buf > is the buffer containing the offending data
* - < buf_ofs > is the position of this buffer ' s input data in the input
* stream , starting at zero . It may be passed as zero if unknown .
* - < buf_out > is the portion of < buf - > data > which was already forwarded and
* which precedes the buffer ' s input . The buffer ' s input starts at
* buf - > head + buf_out .
* - < err_pos > is the pointer to the faulty byte in the buffer ' s input .
* - < show > is the callback to use to display < ctx > . It may be NULL .
*/
void proxy_capture_error ( struct proxy * proxy , int is_back ,
struct proxy * other_end , enum obj_type * target ,
const struct session * sess ,
const struct buffer * buf , long buf_ofs ,
unsigned int buf_out , unsigned int err_pos ,
const union error_snapshot_ctx * ctx ,
void ( * show ) ( struct buffer * , const struct error_snapshot * ) )
{
struct error_snapshot * es ;
unsigned int buf_len ;
int len1 , len2 ;
2018-09-07 13:02:32 -04:00
unsigned int ev_id ;
2021-04-06 05:57:41 -04:00
ev_id = HA_ATOMIC_FETCH_ADD ( & error_snapshot_id , 1 ) ;
2018-09-07 13:02:32 -04:00
2018-09-07 14:07:17 -04:00
buf_len = b_data ( buf ) - buf_out ;
es = malloc ( sizeof ( * es ) + buf_len ) ;
2018-09-07 13:02:32 -04:00
if ( ! es )
return ;
2018-09-07 14:07:17 -04:00
es - > buf_len = buf_len ;
es - > ev_id = ev_id ;
2018-09-07 11:43:26 -04:00
2020-01-06 05:37:00 -05:00
len1 = b_size ( buf ) - b_peek_ofs ( buf , buf_out ) ;
2018-09-07 11:43:26 -04:00
if ( len1 > buf_len )
len1 = buf_len ;
2018-09-07 14:07:17 -04:00
if ( len1 ) {
2018-09-07 11:43:26 -04:00
memcpy ( es - > buf , b_peek ( buf , buf_out ) , len1 ) ;
2018-09-07 14:07:17 -04:00
len2 = buf_len - len1 ;
2018-09-07 11:43:26 -04:00
if ( len2 )
memcpy ( es - > buf + len1 , b_orig ( buf ) , len2 ) ;
}
es - > buf_err = err_pos ;
es - > when = date ; // user-visible date
es - > srv = objt_server ( target ) ;
es - > oe = other_end ;
2020-03-12 10:30:17 -04:00
if ( sess & & objt_conn ( sess - > origin ) & & conn_get_src ( __objt_conn ( sess - > origin ) ) )
2019-07-17 09:20:02 -04:00
es - > src = * __objt_conn ( sess - > origin ) - > src ;
2018-09-07 11:43:26 -04:00
else
memset ( & es - > src , 0 , sizeof ( es - > src ) ) ;
es - > buf_wrap = b_wrap ( buf ) - b_peek ( buf , buf_out ) ;
es - > buf_out = buf_out ;
es - > buf_ofs = buf_ofs ;
/* be sure to indicate the offset of the first IN byte */
if ( es - > buf_ofs > = es - > buf_len )
es - > buf_ofs - = es - > buf_len ;
else
es - > buf_ofs = 0 ;
/* protocol-specific part now */
if ( ctx )
es - > ctx = * ctx ;
else
memset ( & es - > ctx , 0 , sizeof ( es - > ctx ) ) ;
es - > show = show ;
2018-09-07 13:02:32 -04:00
/* note: we still lock since we have to be certain that nobody is
* dumping the output while we free .
*/
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & proxy - > lock ) ;
2018-09-07 13:02:32 -04:00
if ( is_back ) {
es = HA_ATOMIC_XCHG ( & proxy - > invalid_rep , es ) ;
} else {
es = HA_ATOMIC_XCHG ( & proxy - > invalid_req , es ) ;
}
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & proxy - > lock ) ;
2022-09-17 05:07:19 -04:00
ha_free ( & es ) ;
2018-09-07 11:43:26 -04:00
}
MEDIUM: config: don't enforce a low frontend maxconn value anymore
Historically the default frontend's maxconn used to be quite low (2000),
which was sufficient two decades ago but often proved to be a problem
when users had purposely set the global maxconn value but forgot to set
the frontend's.
There is no point in keeping this arbitrary limit for frontends : when
the global maxconn is lower, it's already too high and when the global
maxconn is much higher, it becomes a limiting factor which causes trouble
in production.
This commit allows the value to be set to zero, which becomes the new
default value, to mean it's not directly limited, or in fact it's set
to the global maxconn. Since this operation used to be performed before
computing a possibly automatic global maxconn based on memory limits,
the calculation of the maxconn value and its propagation to the backends'
fullconn has now moved to a dedicated function, proxy_adjust_all_maxconn(),
which is called once the global maxconn is stabilized.
This comes with two benefits :
1) a configuration missing "maxconn" in the defaults section will not
limit itself to a magically hardcoded value but will scale up to the
global maxconn ;
2) when the global maxconn is not set and memory limits are used instead,
the frontends' maxconn automatically adapts, and the backends' fullconn
as well.
2019-02-27 11:25:52 -05:00
/* Configure all proxies which lack a maxconn setting to use the global one by
* default . This avoids the common mistake consisting in setting maxconn only
* in the global section and discovering the hard way that it doesn ' t propagate
* through the frontends . These values are also propagated through the various
2020-06-21 12:42:57 -04:00
* targeted backends , whose fullconn is finally calculated if not yet set .
MEDIUM: config: don't enforce a low frontend maxconn value anymore
Historically the default frontend's maxconn used to be quite low (2000),
which was sufficient two decades ago but often proved to be a problem
when users had purposely set the global maxconn value but forgot to set
the frontend's.
There is no point in keeping this arbitrary limit for frontends : when
the global maxconn is lower, it's already too high and when the global
maxconn is much higher, it becomes a limiting factor which causes trouble
in production.
This commit allows the value to be set to zero, which becomes the new
default value, to mean it's not directly limited, or in fact it's set
to the global maxconn. Since this operation used to be performed before
computing a possibly automatic global maxconn based on memory limits,
the calculation of the maxconn value and its propagation to the backends'
fullconn has now moved to a dedicated function, proxy_adjust_all_maxconn(),
which is called once the global maxconn is stabilized.
This comes with two benefits :
1) a configuration missing "maxconn" in the defaults section will not
limit itself to a magically hardcoded value but will scale up to the
global maxconn ;
2) when the global maxconn is not set and memory limits are used instead,
the frontends' maxconn automatically adapts, and the backends' fullconn
as well.
2019-02-27 11:25:52 -05:00
*/
void proxy_adjust_all_maxconn ( )
{
struct proxy * curproxy ;
struct switching_rule * swrule1 , * swrule2 ;
for ( curproxy = proxies_list ; curproxy ; curproxy = curproxy - > next ) {
2021-10-06 08:24:19 -04:00
if ( curproxy - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) )
MEDIUM: config: don't enforce a low frontend maxconn value anymore
Historically the default frontend's maxconn used to be quite low (2000),
which was sufficient two decades ago but often proved to be a problem
when users had purposely set the global maxconn value but forgot to set
the frontend's.
There is no point in keeping this arbitrary limit for frontends : when
the global maxconn is lower, it's already too high and when the global
maxconn is much higher, it becomes a limiting factor which causes trouble
in production.
This commit allows the value to be set to zero, which becomes the new
default value, to mean it's not directly limited, or in fact it's set
to the global maxconn. Since this operation used to be performed before
computing a possibly automatic global maxconn based on memory limits,
the calculation of the maxconn value and its propagation to the backends'
fullconn has now moved to a dedicated function, proxy_adjust_all_maxconn(),
which is called once the global maxconn is stabilized.
This comes with two benefits :
1) a configuration missing "maxconn" in the defaults section will not
limit itself to a magically hardcoded value but will scale up to the
global maxconn ;
2) when the global maxconn is not set and memory limits are used instead,
the frontends' maxconn automatically adapts, and the backends' fullconn
as well.
2019-02-27 11:25:52 -05:00
continue ;
if ( ! ( curproxy - > cap & PR_CAP_FE ) )
continue ;
if ( ! curproxy - > maxconn )
curproxy - > maxconn = global . maxconn ;
/* update the target backend's fullconn count : default_backend */
if ( curproxy - > defbe . be )
curproxy - > defbe . be - > tot_fe_maxconn + = curproxy - > maxconn ;
else if ( ( curproxy - > cap & PR_CAP_LISTEN ) = = PR_CAP_LISTEN )
curproxy - > tot_fe_maxconn + = curproxy - > maxconn ;
list_for_each_entry ( swrule1 , & curproxy - > switching_rules , list ) {
/* For each target of switching rules, we update their
* tot_fe_maxconn , except if a previous rule points to
* the same backend or to the default backend .
*/
if ( swrule1 - > be . backend ! = curproxy - > defbe . be ) {
2019-03-07 09:02:52 -05:00
/* note: swrule1->be.backend isn't a backend if the rule
* is dynamic , it ' s an expression instead , so it must not
* be dereferenced as a backend before being certain it is .
*/
MEDIUM: config: don't enforce a low frontend maxconn value anymore
Historically the default frontend's maxconn used to be quite low (2000),
which was sufficient two decades ago but often proved to be a problem
when users had purposely set the global maxconn value but forgot to set
the frontend's.
There is no point in keeping this arbitrary limit for frontends : when
the global maxconn is lower, it's already too high and when the global
maxconn is much higher, it becomes a limiting factor which causes trouble
in production.
This commit allows the value to be set to zero, which becomes the new
default value, to mean it's not directly limited, or in fact it's set
to the global maxconn. Since this operation used to be performed before
computing a possibly automatic global maxconn based on memory limits,
the calculation of the maxconn value and its propagation to the backends'
fullconn has now moved to a dedicated function, proxy_adjust_all_maxconn(),
which is called once the global maxconn is stabilized.
This comes with two benefits :
1) a configuration missing "maxconn" in the defaults section will not
limit itself to a magically hardcoded value but will scale up to the
global maxconn ;
2) when the global maxconn is not set and memory limits are used instead,
the frontends' maxconn automatically adapts, and the backends' fullconn
as well.
2019-02-27 11:25:52 -05:00
list_for_each_entry ( swrule2 , & curproxy - > switching_rules , list ) {
if ( swrule2 = = swrule1 ) {
2019-03-07 09:02:52 -05:00
if ( ! swrule1 - > dynamic )
swrule1 - > be . backend - > tot_fe_maxconn + = curproxy - > maxconn ;
MEDIUM: config: don't enforce a low frontend maxconn value anymore
Historically the default frontend's maxconn used to be quite low (2000),
which was sufficient two decades ago but often proved to be a problem
when users had purposely set the global maxconn value but forgot to set
the frontend's.
There is no point in keeping this arbitrary limit for frontends : when
the global maxconn is lower, it's already too high and when the global
maxconn is much higher, it becomes a limiting factor which causes trouble
in production.
This commit allows the value to be set to zero, which becomes the new
default value, to mean it's not directly limited, or in fact it's set
to the global maxconn. Since this operation used to be performed before
computing a possibly automatic global maxconn based on memory limits,
the calculation of the maxconn value and its propagation to the backends'
fullconn has now moved to a dedicated function, proxy_adjust_all_maxconn(),
which is called once the global maxconn is stabilized.
This comes with two benefits :
1) a configuration missing "maxconn" in the defaults section will not
limit itself to a magically hardcoded value but will scale up to the
global maxconn ;
2) when the global maxconn is not set and memory limits are used instead,
the frontends' maxconn automatically adapts, and the backends' fullconn
as well.
2019-02-27 11:25:52 -05:00
break ;
}
else if ( ! swrule2 - > dynamic & & swrule2 - > be . backend = = swrule1 - > be . backend ) {
/* there are multiple refs of this backend */
break ;
}
}
}
}
}
/* automatically compute fullconn if not set. We must not do it in the
* loop above because cross - references are not yet fully resolved .
*/
for ( curproxy = proxies_list ; curproxy ; curproxy = curproxy - > next ) {
2021-10-06 08:24:19 -04:00
if ( curproxy - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) )
MEDIUM: config: don't enforce a low frontend maxconn value anymore
Historically the default frontend's maxconn used to be quite low (2000),
which was sufficient two decades ago but often proved to be a problem
when users had purposely set the global maxconn value but forgot to set
the frontend's.
There is no point in keeping this arbitrary limit for frontends : when
the global maxconn is lower, it's already too high and when the global
maxconn is much higher, it becomes a limiting factor which causes trouble
in production.
This commit allows the value to be set to zero, which becomes the new
default value, to mean it's not directly limited, or in fact it's set
to the global maxconn. Since this operation used to be performed before
computing a possibly automatic global maxconn based on memory limits,
the calculation of the maxconn value and its propagation to the backends'
fullconn has now moved to a dedicated function, proxy_adjust_all_maxconn(),
which is called once the global maxconn is stabilized.
This comes with two benefits :
1) a configuration missing "maxconn" in the defaults section will not
limit itself to a magically hardcoded value but will scale up to the
global maxconn ;
2) when the global maxconn is not set and memory limits are used instead,
the frontends' maxconn automatically adapts, and the backends' fullconn
as well.
2019-02-27 11:25:52 -05:00
continue ;
/* If <fullconn> is not set, let's set it to 10% of the sum of
* the possible incoming frontend ' s maxconns .
*/
if ( ! curproxy - > fullconn & & ( curproxy - > cap & PR_CAP_BE ) ) {
/* we have the sum of the maxconns in <total>. We only
* keep 10 % of that sum to set the default fullconn , with
* a hard minimum of 1 ( to avoid a divide by zero ) .
*/
curproxy - > fullconn = ( curproxy - > tot_fe_maxconn + 9 ) / 10 ;
if ( ! curproxy - > fullconn )
curproxy - > fullconn = 1 ;
}
}
}
2018-09-07 11:43:26 -04:00
/* Config keywords below */
2013-06-21 17:16:39 -04:00
static struct cfg_kw_list cfg_kws = { ILH , {
2021-09-07 04:49:45 -04:00
{ CFG_GLOBAL , " grace " , proxy_parse_grace } ,
2017-03-23 17:44:13 -04:00
{ CFG_GLOBAL , " hard-stop-after " , proxy_parse_hard_stop_after } ,
MEDIUM: global: Add a "close-spread-time" option to spread soft-stop on time window
The new 'close-spread-time' global option can be used to spread idle and
active HTTP connction closing after a SIGUSR1 signal is received. This
allows to limit bursts of reconnections when too many idle connections
are closed at once. Indeed, without this new mechanism, in case of
soft-stop, all the idle connections would be closed at once (after the
grace period is over), and all active HTTP connections would be closed
by appending a "Connection: close" header to the next response that goes
over it (or via a GOAWAY frame in case of HTTP2).
This patch adds the support of this new option for HTTP as well as HTTP2
connections. It works differently on active and idle connections.
On active connections, instead of sending systematically the GOAWAY
frame or adding the 'Connection: close' header like before once the
soft-stop has started, a random based on the remainder of the close
window is calculated, and depending on its result we could decide to
keep the connection alive. The random will be recalculated for any
subsequent request/response on this connection so the GOAWAY will still
end up being sent, but we might wait a few more round trips. This will
ensure that goaways are distributed along a longer time window than
before.
On idle connections, a random factor is used when determining the expire
field of the connection's task, which should naturally spread connection
closings on the time window (see h2c_update_timeout).
This feature request was described in GitHub issue #1614.
This patch should be backported to 2.5. It depends on "BUG/MEDIUM:
mux-h2: make use of http-request and keep-alive timeouts" which
refactorized the timeout management of HTTP2 connections.
2022-04-08 12:04:18 -04:00
{ CFG_GLOBAL , " close-spread-time " , proxy_parse_close_spread_time } ,
2008-07-09 14:34:27 -04:00
{ CFG_LISTEN , " timeout " , proxy_parse_timeout } ,
2019-05-14 14:57:59 -04:00
{ CFG_LISTEN , " clitimeout " , proxy_parse_timeout } , /* This keyword actually fails to parse, this line remains for better error messages. */
{ CFG_LISTEN , " contimeout " , proxy_parse_timeout } , /* This keyword actually fails to parse, this line remains for better error messages. */
{ CFG_LISTEN , " srvtimeout " , proxy_parse_timeout } , /* This keyword actually fails to parse, this line remains for better error messages. */
2009-03-05 17:48:25 -05:00
{ CFG_LISTEN , " rate-limit " , proxy_parse_rate_limit } ,
2014-04-25 07:58:37 -04:00
{ CFG_LISTEN , " max-keep-alive-queue " , proxy_parse_max_ka_queue } ,
2015-05-26 11:44:32 -04:00
{ CFG_LISTEN , " declare " , proxy_parse_declare } ,
MEDIUM: streams: Add the ability to retry a request on L7 failure.
When running in HTX mode, if we sent the request, but failed to get the
answer, either because the server just closed its socket, we hit a server
timeout, or we get a 404, 408, 425, 500, 501, 502, 503 or 504 error,
attempt to retry the request, exactly as if we just failed to connect to
the server.
To do so, add a new backend keyword, "retry-on".
It accepts a list of keywords, which can be "none" (never retry),
"conn-failure" (we failed to connect, or to do the SSL handshake),
"empty-response" (the server closed the connection without answering),
"response-timeout" (we timed out while waiting for the server response),
or "404", "408", "425", "500", "501", "502", "503" and "504".
The default is "conn-failure".
2019-04-05 09:30:12 -04:00
{ CFG_LISTEN , " retry-on " , proxy_parse_retry_on } ,
2020-07-08 23:58:51 -04:00
# ifdef TCP_KEEPCNT
2020-07-08 22:13:20 -04:00
{ CFG_LISTEN , " clitcpka-cnt " , proxy_parse_tcpka_cnt } ,
{ CFG_LISTEN , " srvtcpka-cnt " , proxy_parse_tcpka_cnt } ,
2020-07-08 23:58:51 -04:00
# endif
# ifdef TCP_KEEPIDLE
{ CFG_LISTEN , " clitcpka-idle " , proxy_parse_tcpka_idle } ,
2020-07-08 22:13:20 -04:00
{ CFG_LISTEN , " srvtcpka-idle " , proxy_parse_tcpka_idle } ,
2020-07-08 23:58:51 -04:00
# endif
# ifdef TCP_KEEPINTVL
{ CFG_LISTEN , " clitcpka-intvl " , proxy_parse_tcpka_intvl } ,
2020-07-08 22:13:20 -04:00
{ CFG_LISTEN , " srvtcpka-intvl " , proxy_parse_tcpka_intvl } ,
2020-07-08 23:58:51 -04:00
# endif
2008-07-09 14:34:27 -04:00
{ 0 , NULL , NULL } ,
} } ;
2018-11-25 13:14:37 -05:00
INITCALL1 ( STG_REGISTER , cfg_register_keywords , & cfg_kws ) ;
2016-11-24 06:02:29 -05:00
/* Expects to find a frontend named <arg> and returns it, otherwise displays various
* adequate error messages and returns NULL . This function is designed to be used by
* functions requiring a frontend on the CLI .
*/
struct proxy * cli_find_frontend ( struct appctx * appctx , const char * arg )
{
struct proxy * px ;
if ( ! * arg ) {
2019-08-09 05:21:01 -04:00
cli_err ( appctx , " A frontend name is expected. \n " ) ;
2016-11-24 06:02:29 -05:00
return NULL ;
}
px = proxy_fe_by_name ( arg ) ;
if ( ! px ) {
2019-08-09 05:21:01 -04:00
cli_err ( appctx , " No such frontend. \n " ) ;
2016-11-24 06:02:29 -05:00
return NULL ;
}
return px ;
}
2017-03-14 15:08:46 -04:00
/* Expects to find a backend named <arg> and returns it, otherwise displays various
* adequate error messages and returns NULL . This function is designed to be used by
* functions requiring a frontend on the CLI .
*/
struct proxy * cli_find_backend ( struct appctx * appctx , const char * arg )
{
struct proxy * px ;
if ( ! * arg ) {
2019-08-09 05:21:01 -04:00
cli_err ( appctx , " A backend name is expected. \n " ) ;
2017-03-14 15:08:46 -04:00
return NULL ;
}
px = proxy_be_by_name ( arg ) ;
if ( ! px ) {
2019-08-09 05:21:01 -04:00
cli_err ( appctx , " No such backend. \n " ) ;
2017-03-14 15:08:46 -04:00
return NULL ;
}
return px ;
}
2020-07-01 01:00:59 -04:00
/* parse a "show servers [state|conn]" CLI line, returns 0 if it wants to start
* the dump or 1 if it stops immediately . If an argument is specified , it will
2022-05-05 11:00:20 -04:00
* reserve a show_srv_ctx context and set the proxy pointer into - > px , its ID
* into - > only_pxid , and - > show_conn to 0 for " state " , or 1 for " conn " .
2016-11-18 20:25:36 -05:00
*/
2018-04-18 07:26:46 -04:00
static int cli_parse_show_servers ( char * * args , char * payload , struct appctx * appctx , void * private )
2016-11-18 20:25:36 -05:00
{
2022-05-05 11:00:20 -04:00
struct show_srv_ctx * ctx = applet_reserve_svcctx ( appctx , sizeof ( * ctx ) ) ;
2016-12-16 12:23:39 -05:00
struct proxy * px ;
2016-11-18 20:25:36 -05:00
2022-05-05 11:00:20 -04:00
ctx - > show_conn = * args [ 2 ] = = ' c ' ; // "conn" vs "state"
2020-07-01 01:00:59 -04:00
2016-11-18 20:25:36 -05:00
/* check if a backend name has been provided */
if ( * args [ 3 ] ) {
/* read server state from local file */
2016-12-16 12:23:39 -05:00
px = proxy_be_by_name ( args [ 3 ] ) ;
2016-11-18 20:25:36 -05:00
2019-08-09 05:21:01 -04:00
if ( ! px )
return cli_err ( appctx , " Can't find backend. \n " ) ;
2022-05-05 11:00:20 -04:00
ctx - > px = px ;
ctx - > only_pxid = px - > uuid ;
2016-11-18 20:25:36 -05:00
}
return 0 ;
}
2021-02-11 16:51:26 -05:00
/* helper to dump server addr */
static void dump_server_addr ( const struct sockaddr_storage * addr , char * addr_str )
{
addr_str [ 0 ] = ' \0 ' ;
switch ( addr - > ss_family ) {
case AF_INET :
case AF_INET6 :
addr_to_str ( addr , addr_str , INET6_ADDRSTRLEN + 1 ) ;
break ;
default :
memcpy ( addr_str , " - \0 " , 2 ) ;
break ;
}
}
2020-07-01 01:02:42 -04:00
/* dumps server state information for all the servers found in backend cli.p0.
2016-11-18 20:25:36 -05:00
* These information are all the parameters which may change during HAProxy runtime .
2022-05-05 11:00:20 -04:00
* By default , we only export to the last known server state file format . These
* information can be used at next startup to recover same level of server
* state . It takes its context from show_srv_ctx , with the proxy pointer from
* - > px , the proxy ' s id - > only_pxid , the server ' s pointer from - > sv , and the
* choice of what to dump from - > show_conn .
2016-11-18 20:25:36 -05:00
*/
2022-05-27 04:26:46 -04:00
static int dump_servers_state ( struct stconn * sc )
2016-11-18 20:25:36 -05:00
{
2022-05-27 04:26:46 -04:00
struct appctx * appctx = __sc_appctx ( sc ) ;
2022-05-05 11:00:20 -04:00
struct show_srv_ctx * ctx = appctx - > svcctx ;
struct proxy * px = ctx - > px ;
2016-11-18 20:25:36 -05:00
struct server * srv ;
char srv_addr [ INET6_ADDRSTRLEN + 1 ] ;
2021-02-11 16:51:26 -05:00
char srv_agent_addr [ INET6_ADDRSTRLEN + 1 ] ;
char srv_check_addr [ INET6_ADDRSTRLEN + 1 ] ;
2016-11-18 20:25:36 -05:00
time_t srv_time_since_last_change ;
int bk_f_forced_id , srv_f_forced_id ;
2018-07-02 11:00:54 -04:00
char * srvrecord ;
2016-11-18 20:25:36 -05:00
2022-05-05 11:00:20 -04:00
if ( ! ctx - > sv )
ctx - > sv = px - > srv ;
2016-11-18 20:25:36 -05:00
2022-05-05 11:00:20 -04:00
for ( ; ctx - > sv ! = NULL ; ctx - > sv = srv - > next ) {
srv = ctx - > sv ;
2016-11-18 20:25:36 -05:00
2021-02-11 16:51:26 -05:00
dump_server_addr ( & srv - > addr , srv_addr ) ;
dump_server_addr ( & srv - > check . addr , srv_check_addr ) ;
dump_server_addr ( & srv - > agent . addr , srv_agent_addr ) ;
2023-04-28 03:16:15 -04:00
srv_time_since_last_change = ns_to_sec ( now_ns ) - srv - > last_change ;
2016-12-16 12:23:39 -05:00
bk_f_forced_id = px - > options & PR_O_FORCED_ID ? 1 : 0 ;
2016-11-18 20:25:36 -05:00
srv_f_forced_id = srv - > flags & SRV_F_FORCED_ID ? 1 : 0 ;
2018-07-02 11:00:54 -04:00
srvrecord = NULL ;
if ( srv - > srvrq & & srv - > srvrq - > name )
srvrecord = srv - > srvrq - > name ;
2022-05-05 11:00:20 -04:00
if ( ctx - > show_conn = = 0 ) {
2020-07-01 01:00:59 -04:00
/* show servers state */
chunk_printf ( & trash ,
" %d %s "
" %d %s %s "
" %d %d %d %d %ld "
" %d %d %d %d %d "
2020-11-14 13:25:33 -05:00
" %d %d %s %u "
2021-02-11 16:51:26 -05:00
" %s %d %d "
" %s %s %d "
2020-07-01 01:00:59 -04:00
" \n " ,
2022-09-14 11:48:55 -04:00
px - > uuid , HA_ANON_CLI ( px - > id ) ,
2022-09-29 04:27:33 -04:00
srv - > puid , HA_ANON_CLI ( srv - > id ) ,
hash_ipanon ( appctx - > cli_anon_key , srv_addr , 0 ) ,
2022-09-14 11:48:55 -04:00
srv - > cur_state , srv - > cur_admin , srv - > uweight , srv - > iweight ,
( long int ) srv_time_since_last_change ,
srv - > check . status , srv - > check . result , srv - > check . health ,
2022-10-12 15:40:31 -04:00
srv - > check . state & 0x0F , srv - > agent . state & 0x1F ,
2022-09-29 04:28:44 -04:00
bk_f_forced_id , srv_f_forced_id ,
srv - > hostname ? HA_ANON_CLI ( srv - > hostname ) : " - " , srv - > svc_port ,
2021-02-11 16:51:26 -05:00
srvrecord ? srvrecord : " - " , srv - > use_ssl , srv - > check . port ,
srv_check_addr , srv_agent_addr , srv - > agent . port ) ;
2020-07-01 01:00:59 -04:00
} else {
/* show servers conn */
int thr ;
chunk_printf ( & trash ,
" %s/%s %d/%d %s %u - %u %u %u %u %u %u %d %u " ,
2022-09-14 11:48:55 -04:00
HA_ANON_CLI ( px - > id ) , HA_ANON_CLI ( srv - > id ) ,
2022-09-29 04:27:33 -04:00
px - > uuid , srv - > puid , hash_ipanon ( appctx - > cli_anon_key , srv_addr , 0 ) ,
2022-09-14 11:48:55 -04:00
srv - > svc_port , srv - > pool_purge_delay ,
2020-07-01 01:00:59 -04:00
srv - > curr_used_conns , srv - > max_used_conns , srv - > est_need_conns ,
srv - > curr_idle_nb , srv - > curr_safe_nb , ( int ) srv - > max_idle_conns , srv - > curr_idle_conns ) ;
2020-07-02 09:19:57 -04:00
for ( thr = 0 ; thr < global . nbthread & & srv - > curr_idle_thr ; thr + + )
2020-07-01 01:00:59 -04:00
chunk_appendf ( & trash , " %u " , srv - > curr_idle_thr [ thr ] ) ;
chunk_appendf ( & trash , " \n " ) ;
}
2022-05-18 09:07:19 -04:00
if ( applet_putchk ( appctx , & trash ) = = - 1 ) {
2016-11-18 20:25:36 -05:00
return 0 ;
}
}
return 1 ;
}
/* Parses backend list or simply use backend name provided by the user to return
2022-05-05 11:00:20 -04:00
* states of servers to stdout . It takes its context from show_srv_ctx and dumps
* proxy - > px and stops if - > only_pxid is non - null .
2016-11-18 20:25:36 -05:00
*/
static int cli_io_handler_servers_state ( struct appctx * appctx )
{
2022-05-05 11:00:20 -04:00
struct show_srv_ctx * ctx = appctx - > svcctx ;
2022-05-27 05:08:15 -04:00
struct stconn * sc = appctx_sc ( appctx ) ;
2016-11-18 20:25:36 -05:00
struct proxy * curproxy ;
2022-05-05 13:26:18 -04:00
if ( ctx - > state = = SHOW_SRV_HEAD ) {
2022-05-05 11:00:20 -04:00
if ( ctx - > show_conn = = 0 )
2020-07-01 01:00:59 -04:00
chunk_printf ( & trash , " %d \n # %s \n " , SRV_STATE_FILE_VERSION , SRV_STATE_FILE_FIELD_NAMES ) ;
else
chunk_printf ( & trash ,
" # bkname/svname bkid/svid addr port - purge_delay used_cur used_max need_est unsafe_nb safe_nb idle_lim idle_cur idle_per_thr[%d] \n " ,
global . nbthread ) ;
2022-05-18 09:07:19 -04:00
if ( applet_putchk ( appctx , & trash ) = = - 1 )
2016-11-18 20:25:36 -05:00
return 0 ;
2022-05-18 09:07:19 -04:00
2022-05-05 13:26:18 -04:00
ctx - > state = SHOW_SRV_LIST ;
if ( ! ctx - > px )
ctx - > px = proxies_list ;
2016-11-18 20:25:36 -05:00
}
2022-05-05 11:00:20 -04:00
for ( ; ctx - > px ! = NULL ; ctx - > px = curproxy - > next ) {
curproxy = ctx - > px ;
2016-11-18 20:25:36 -05:00
/* servers are only in backends */
2021-08-25 12:15:31 -04:00
if ( ( curproxy - > cap & PR_CAP_BE ) & & ! ( curproxy - > cap & PR_CAP_INT ) ) {
2022-05-27 04:26:46 -04:00
if ( ! dump_servers_state ( sc ) )
2016-11-18 20:25:36 -05:00
return 0 ;
}
/* only the selected proxy is dumped */
2022-05-05 11:00:20 -04:00
if ( ctx - > only_pxid )
2016-11-18 20:25:36 -05:00
break ;
}
return 1 ;
}
2016-12-16 12:01:15 -05:00
/* Parses backend list and simply report backend names. It keeps the proxy
2022-05-05 11:05:38 -04:00
* pointer in svcctx since there ' s nothing else to store there .
2016-12-16 12:01:15 -05:00
*/
2016-11-22 06:34:16 -05:00
static int cli_io_handler_show_backend ( struct appctx * appctx )
{
struct proxy * curproxy ;
chunk_reset ( & trash ) ;
2022-05-05 11:05:38 -04:00
if ( ! appctx - > svcctx ) {
2016-11-22 06:34:16 -05:00
chunk_printf ( & trash , " # name \n " ) ;
2022-05-18 09:07:19 -04:00
if ( applet_putchk ( appctx , & trash ) = = - 1 )
2016-11-22 06:34:16 -05:00
return 0 ;
2022-05-18 09:07:19 -04:00
2022-05-05 11:05:38 -04:00
appctx - > svcctx = proxies_list ;
2016-11-22 06:34:16 -05:00
}
2022-05-05 11:05:38 -04:00
for ( ; appctx - > svcctx ! = NULL ; appctx - > svcctx = curproxy - > next ) {
curproxy = appctx - > svcctx ;
2016-11-22 06:34:16 -05:00
2022-05-05 11:10:03 -04:00
/* looking for non-internal backends only */
if ( ( curproxy - > cap & ( PR_CAP_BE | PR_CAP_INT ) ) ! = PR_CAP_BE )
2016-11-22 06:34:16 -05:00
continue ;
chunk_appendf ( & trash , " %s \n " , curproxy - > id ) ;
2022-05-18 09:07:19 -04:00
if ( applet_putchk ( appctx , & trash ) = = - 1 )
2016-11-22 06:34:16 -05:00
return 0 ;
}
return 1 ;
}
2016-11-18 20:25:36 -05:00
2018-08-21 08:50:44 -04:00
/* Parses the "enable dynamic-cookies backend" directive, it always returns 1.
*
* Grabs the proxy lock and each server ' s lock .
*/
2018-04-18 07:26:46 -04:00
static int cli_parse_enable_dyncookie_backend ( char * * args , char * payload , struct appctx * appctx , void * private )
2017-03-14 15:08:46 -04:00
{
struct proxy * px ;
struct server * s ;
if ( ! cli_has_level ( appctx , ACCESS_LVL_ADMIN ) )
return 1 ;
px = cli_find_backend ( appctx , args [ 3 ] ) ;
if ( ! px )
return 1 ;
2023-09-20 04:54:06 -04:00
if ( px - > mode ! = PR_MODE_TCP & & px - > mode ! = PR_MODE_HTTP )
return cli_err ( appctx , " Not available. \n " ) ;
2019-07-30 05:59:34 -04:00
/* Note: this lock is to make sure this doesn't change while another
* thread is in srv_set_dyncookie ( ) .
*/
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & px - > lock ) ;
2017-03-14 15:08:46 -04:00
px - > ck_opts | = PR_CK_DYNAMIC ;
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & px - > lock ) ;
2017-03-14 15:08:46 -04:00
2018-08-21 08:50:44 -04:00
for ( s = px - > srv ; s ! = NULL ; s = s - > next ) {
HA_SPIN_LOCK ( SERVER_LOCK , & s - > lock ) ;
2017-03-14 15:08:46 -04:00
srv_set_dyncookie ( s ) ;
2018-08-21 08:50:44 -04:00
HA_SPIN_UNLOCK ( SERVER_LOCK , & s - > lock ) ;
}
2017-03-14 15:08:46 -04:00
return 1 ;
}
2018-08-21 08:50:44 -04:00
/* Parses the "disable dynamic-cookies backend" directive, it always returns 1.
*
* Grabs the proxy lock and each server ' s lock .
*/
2018-04-18 07:26:46 -04:00
static int cli_parse_disable_dyncookie_backend ( char * * args , char * payload , struct appctx * appctx , void * private )
2017-03-14 15:08:46 -04:00
{
struct proxy * px ;
struct server * s ;
if ( ! cli_has_level ( appctx , ACCESS_LVL_ADMIN ) )
return 1 ;
px = cli_find_backend ( appctx , args [ 3 ] ) ;
if ( ! px )
return 1 ;
2023-09-20 04:54:06 -04:00
if ( px - > mode ! = PR_MODE_TCP & & px - > mode ! = PR_MODE_HTTP )
return cli_err ( appctx , " Not available. \n " ) ;
2019-07-30 05:59:34 -04:00
/* Note: this lock is to make sure this doesn't change while another
* thread is in srv_set_dyncookie ( ) .
*/
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & px - > lock ) ;
2017-03-14 15:08:46 -04:00
px - > ck_opts & = ~ PR_CK_DYNAMIC ;
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & px - > lock ) ;
2017-03-14 15:08:46 -04:00
for ( s = px - > srv ; s ! = NULL ; s = s - > next ) {
2018-08-21 08:50:44 -04:00
HA_SPIN_LOCK ( SERVER_LOCK , & s - > lock ) ;
2021-02-20 04:46:51 -05:00
if ( ! ( s - > flags & SRV_F_COOKIESET ) )
ha_free ( & s - > cookie ) ;
2018-08-21 08:50:44 -04:00
HA_SPIN_UNLOCK ( SERVER_LOCK , & s - > lock ) ;
2017-03-14 15:08:46 -04:00
}
return 1 ;
}
2018-08-21 08:50:44 -04:00
/* Parses the "set dynamic-cookie-key backend" directive, it always returns 1.
*
* Grabs the proxy lock and each server ' s lock .
*/
2018-04-18 07:26:46 -04:00
static int cli_parse_set_dyncookie_key_backend ( char * * args , char * payload , struct appctx * appctx , void * private )
2017-03-14 15:08:46 -04:00
{
struct proxy * px ;
struct server * s ;
char * newkey ;
if ( ! cli_has_level ( appctx , ACCESS_LVL_ADMIN ) )
return 1 ;
px = cli_find_backend ( appctx , args [ 3 ] ) ;
if ( ! px )
return 1 ;
2023-09-20 04:54:06 -04:00
if ( px - > mode ! = PR_MODE_TCP & & px - > mode ! = PR_MODE_HTTP )
return cli_err ( appctx , " Not available. \n " ) ;
2019-08-09 05:21:01 -04:00
if ( ! * args [ 4 ] )
return cli_err ( appctx , " String value expected. \n " ) ;
2017-03-14 15:08:46 -04:00
newkey = strdup ( args [ 4 ] ) ;
2019-08-09 05:21:01 -04:00
if ( ! newkey )
return cli_err ( appctx , " Failed to allocate memory. \n " ) ;
2018-08-21 08:50:44 -04:00
2019-07-30 05:59:34 -04:00
/* Note: this lock is to make sure this doesn't change while another
* thread is in srv_set_dyncookie ( ) .
*/
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & px - > lock ) ;
2017-03-14 15:08:46 -04:00
free ( px - > dyncookie_key ) ;
px - > dyncookie_key = newkey ;
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & px - > lock ) ;
2017-03-14 15:08:46 -04:00
2018-08-21 08:50:44 -04:00
for ( s = px - > srv ; s ! = NULL ; s = s - > next ) {
HA_SPIN_LOCK ( SERVER_LOCK , & s - > lock ) ;
2017-03-14 15:08:46 -04:00
srv_set_dyncookie ( s ) ;
2018-08-21 08:50:44 -04:00
HA_SPIN_UNLOCK ( SERVER_LOCK , & s - > lock ) ;
}
2017-03-14 15:08:46 -04:00
return 1 ;
}
2018-08-21 08:50:44 -04:00
/* Parses the "set maxconn frontend" directive, it always returns 1.
*
* Grabs the proxy lock .
*/
2018-04-18 07:26:46 -04:00
static int cli_parse_set_maxconn_frontend ( char * * args , char * payload , struct appctx * appctx , void * private )
2016-11-23 10:22:04 -05:00
{
struct proxy * px ;
struct listener * l ;
int v ;
if ( ! cli_has_level ( appctx , ACCESS_LVL_ADMIN ) )
return 1 ;
px = cli_find_frontend ( appctx , args [ 3 ] ) ;
if ( ! px )
return 1 ;
2019-08-09 05:21:01 -04:00
if ( ! * args [ 4 ] )
return cli_err ( appctx , " Integer value expected. \n " ) ;
2016-11-23 10:22:04 -05:00
v = atoi ( args [ 4 ] ) ;
2019-08-09 05:21:01 -04:00
if ( v < 0 )
return cli_err ( appctx , " Value out of range. \n " ) ;
2016-11-23 10:22:04 -05:00
/* OK, the value is fine, so we assign it to the proxy and to all of
* its listeners . The blocked ones will be dequeued .
*/
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRLOCK ( PROXY_LOCK , & px - > lock ) ;
2018-08-21 08:50:44 -04:00
2016-11-23 10:22:04 -05:00
px - > maxconn = v ;
list_for_each_entry ( l , & px - > conf . listeners , by_fe ) {
if ( l - > state = = LI_FULL )
2023-02-06 11:19:58 -05:00
relax_listener ( l , 1 , 0 ) ;
2016-11-23 10:22:04 -05:00
}
2019-12-10 08:10:52 -05:00
if ( px - > maxconn > px - > feconn )
dequeue_proxy_listeners ( px ) ;
2016-11-23 10:22:04 -05:00
2020-10-20 11:24:27 -04:00
HA_RWLOCK_WRUNLOCK ( PROXY_LOCK , & px - > lock ) ;
2018-08-21 08:50:44 -04:00
2016-11-23 10:22:04 -05:00
return 1 ;
}
2018-08-21 08:50:44 -04:00
/* Parses the "shutdown frontend" directive, it always returns 1.
*
* Grabs the proxy lock .
*/
2018-04-18 07:26:46 -04:00
static int cli_parse_shutdown_frontend ( char * * args , char * payload , struct appctx * appctx , void * private )
2016-11-24 05:13:06 -05:00
{
struct proxy * px ;
if ( ! cli_has_level ( appctx , ACCESS_LVL_ADMIN ) )
return 1 ;
px = cli_find_frontend ( appctx , args [ 2 ] ) ;
if ( ! px )
return 1 ;
2021-10-06 08:24:19 -04:00
if ( px - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) )
2019-08-09 05:21:01 -04:00
return cli_msg ( appctx , LOG_NOTICE , " Frontend was already shut down. \n " ) ;
2016-11-24 05:13:06 -05:00
stop_proxy ( px ) ;
return 1 ;
}
2018-08-21 08:50:44 -04:00
/* Parses the "disable frontend" directive, it always returns 1.
*
* Grabs the proxy lock .
*/
2018-04-18 07:26:46 -04:00
static int cli_parse_disable_frontend ( char * * args , char * payload , struct appctx * appctx , void * private )
2016-11-24 05:55:28 -05:00
{
struct proxy * px ;
2018-08-21 08:50:44 -04:00
int ret ;
2016-11-24 05:55:28 -05:00
if ( ! cli_has_level ( appctx , ACCESS_LVL_ADMIN ) )
return 1 ;
px = cli_find_frontend ( appctx , args [ 2 ] ) ;
if ( ! px )
return 1 ;
2021-10-06 08:24:19 -04:00
if ( px - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) )
2019-08-09 05:21:01 -04:00
return cli_msg ( appctx , LOG_NOTICE , " Frontend was previously shut down, cannot disable. \n " ) ;
2016-11-24 05:55:28 -05:00
2020-09-24 02:04:27 -04:00
if ( ! px - > li_ready )
return cli_msg ( appctx , LOG_NOTICE , " All sockets are already disabled. \n " ) ;
2016-11-24 05:55:28 -05:00
2022-09-08 08:35:35 -04:00
/* pause_proxy will take PROXY_LOCK */
2018-08-21 08:50:44 -04:00
ret = pause_proxy ( px ) ;
2019-08-09 05:21:01 -04:00
if ( ! ret )
return cli_err ( appctx , " Failed to pause frontend, check logs for precise cause. \n " ) ;
2016-11-24 05:55:28 -05:00
return 1 ;
}
2018-08-21 08:50:44 -04:00
/* Parses the "enable frontend" directive, it always returns 1.
*
* Grabs the proxy lock .
*/
2018-04-18 07:26:46 -04:00
static int cli_parse_enable_frontend ( char * * args , char * payload , struct appctx * appctx , void * private )
2016-11-24 05:55:28 -05:00
{
struct proxy * px ;
2018-08-21 08:50:44 -04:00
int ret ;
2016-11-24 05:55:28 -05:00
if ( ! cli_has_level ( appctx , ACCESS_LVL_ADMIN ) )
return 1 ;
px = cli_find_frontend ( appctx , args [ 2 ] ) ;
if ( ! px )
return 1 ;
2021-10-06 08:24:19 -04:00
if ( px - > flags & ( PR_FL_DISABLED | PR_FL_STOPPED ) )
2019-08-09 05:21:01 -04:00
return cli_err ( appctx , " Frontend was previously shut down, cannot enable. \n " ) ;
2016-11-24 05:55:28 -05:00
2020-09-24 02:04:27 -04:00
if ( px - > li_ready = = px - > li_all )
return cli_msg ( appctx , LOG_NOTICE , " All sockets are already enabled. \n " ) ;
2016-11-24 05:55:28 -05:00
2022-09-08 08:35:35 -04:00
/* resume_proxy will take PROXY_LOCK */
2018-08-21 08:50:44 -04:00
ret = resume_proxy ( px ) ;
2019-08-09 05:21:01 -04:00
if ( ! ret )
return cli_err ( appctx , " Failed to resume frontend, check logs for precise cause (port conflict?) . \ n " ) ;
2016-11-24 05:55:28 -05:00
return 1 ;
}
2022-05-03 05:24:24 -04:00
/* appctx context used during "show errors" */
struct show_errors_ctx {
struct proxy * px ; /* current proxy being dumped, NULL = not started yet. */
unsigned int flag ; /* bit0: buffer being dumped, 0 = req, 1 = resp ; bit1=skip req ; bit2=skip resp. */
unsigned int ev_id ; /* event ID of error being dumped */
int iid ; /* if >= 0, ID of the proxy to filter on */
int ptr ; /* <0: headers, >=0 : text pointer to restart from */
int bol ; /* pointer to beginning of current line */
} ;
2018-09-07 12:34:24 -04:00
/* "show errors" handler for the CLI. Returns 0 if wants to continue, 1 to stop
* now .
*/
static int cli_parse_show_errors ( char * * args , char * payload , struct appctx * appctx , void * private )
{
2022-05-03 05:24:24 -04:00
struct show_errors_ctx * ctx = applet_reserve_svcctx ( appctx , sizeof ( * ctx ) ) ;
2018-09-07 12:34:24 -04:00
if ( ! cli_has_level ( appctx , ACCESS_LVL_OPER ) )
return 1 ;
if ( * args [ 2 ] ) {
struct proxy * px ;
px = proxy_find_by_name ( args [ 2 ] , 0 , 0 ) ;
if ( px )
2022-05-03 05:24:24 -04:00
ctx - > iid = px - > uuid ;
2018-09-07 12:34:24 -04:00
else
2022-05-03 05:24:24 -04:00
ctx - > iid = atoi ( args [ 2 ] ) ;
2018-09-07 12:34:24 -04:00
2022-05-03 05:24:24 -04:00
if ( ! ctx - > iid )
2019-08-09 05:21:01 -04:00
return cli_err ( appctx , " No such proxy. \n " ) ;
2018-09-07 12:34:24 -04:00
}
else
2022-05-03 05:24:24 -04:00
ctx - > iid = - 1 ; // dump all proxies
2018-09-07 12:34:24 -04:00
2022-05-03 05:24:24 -04:00
ctx - > flag = 0 ;
2018-09-07 12:34:24 -04:00
if ( strcmp ( args [ 3 ] , " request " ) = = 0 )
2022-05-03 05:24:24 -04:00
ctx - > flag | = 4 ; // ignore response
2018-09-07 12:34:24 -04:00
else if ( strcmp ( args [ 3 ] , " response " ) = = 0 )
2022-05-03 05:24:24 -04:00
ctx - > flag | = 2 ; // ignore request
ctx - > px = NULL ;
2018-09-07 12:34:24 -04:00
return 0 ;
}
2022-05-17 13:07:51 -04:00
/* This function dumps all captured errors onto the stream connector's
2018-09-07 12:34:24 -04:00
* read buffer . It returns 0 if the output buffer is full and it needs
* to be called again , otherwise non - zero .
*/
static int cli_io_handler_show_errors ( struct appctx * appctx )
{
2022-05-03 05:24:24 -04:00
struct show_errors_ctx * ctx = appctx - > svcctx ;
2022-05-27 05:08:15 -04:00
struct stconn * sc = appctx_sc ( appctx ) ;
2018-09-07 12:34:24 -04:00
extern const char * monthname [ 12 ] ;
2023-04-03 12:32:50 -04:00
/* FIXME: Don't watch the other side !*/
2023-04-13 10:16:15 -04:00
if ( unlikely ( sc_opposite ( sc ) - > flags & SC_FL_SHUT_DONE ) )
2018-09-07 12:34:24 -04:00
return 1 ;
chunk_reset ( & trash ) ;
2022-05-03 05:24:24 -04:00
if ( ! ctx - > px ) {
2018-09-07 12:34:24 -04:00
/* the function had not been called yet, let's prepare the
* buffer for a response .
*/
struct tm tm ;
get_localtime ( date . tv_sec , & tm ) ;
chunk_appendf ( & trash , " Total events captured on [%02d/%s/%04d:%02d:%02d:%02d.%03d] : %u \n " ,
tm . tm_mday , monthname [ tm . tm_mon ] , tm . tm_year + 1900 ,
tm . tm_hour , tm . tm_min , tm . tm_sec , ( int ) ( date . tv_usec / 1000 ) ,
error_snapshot_id ) ;
2022-05-18 09:07:19 -04:00
if ( applet_putchk ( appctx , & trash ) = = - 1 )
2018-09-07 13:55:44 -04:00
goto cant_send ;
2018-09-07 12:34:24 -04:00
2022-05-03 05:24:24 -04:00
ctx - > px = proxies_list ;
ctx - > bol = 0 ;
ctx - > ptr = - 1 ;
2018-09-07 12:34:24 -04:00
}
/* we have two inner loops here, one for the proxy, the other one for
* the buffer .
*/
2022-05-03 05:24:24 -04:00
while ( ctx - > px ) {
2018-09-07 12:34:24 -04:00
struct error_snapshot * es ;
2022-05-03 05:24:24 -04:00
HA_RWLOCK_RDLOCK ( PROXY_LOCK , & ctx - > px - > lock ) ;
2018-09-07 13:55:44 -04:00
2022-05-03 05:24:24 -04:00
if ( ( ctx - > flag & 1 ) = = 0 ) {
es = ctx - > px - > invalid_req ;
if ( ctx - > flag & 2 ) // skip req
2018-09-07 12:34:24 -04:00
goto next ;
}
else {
2022-05-03 05:24:24 -04:00
es = ctx - > px - > invalid_rep ;
if ( ctx - > flag & 4 ) // skip resp
2018-09-07 12:34:24 -04:00
goto next ;
}
2018-09-07 13:02:32 -04:00
if ( ! es )
2018-09-07 12:34:24 -04:00
goto next ;
2022-05-03 05:24:24 -04:00
if ( ctx - > iid > = 0 & &
ctx - > px - > uuid ! = ctx - > iid & &
( ! es - > oe | | es - > oe - > uuid ! = ctx - > iid ) )
2018-09-07 12:34:24 -04:00
goto next ;
2022-05-03 05:24:24 -04:00
if ( ctx - > ptr < 0 ) {
2018-09-07 12:34:24 -04:00
/* just print headers now */
char pn [ INET6_ADDRSTRLEN ] ;
struct tm tm ;
int port ;
get_localtime ( es - > when . tv_sec , & tm ) ;
chunk_appendf ( & trash , " \n [%02d/%s/%04d:%02d:%02d:%02d.%03d] " ,
tm . tm_mday , monthname [ tm . tm_mon ] , tm . tm_year + 1900 ,
tm . tm_hour , tm . tm_min , tm . tm_sec , ( int ) ( es - > when . tv_usec / 1000 ) ) ;
switch ( addr_to_str ( & es - > src , pn , sizeof ( pn ) ) ) {
case AF_INET :
case AF_INET6 :
port = get_host_port ( & es - > src ) ;
break ;
default :
port = 0 ;
}
2022-05-03 05:24:24 -04:00
switch ( ctx - > flag & 1 ) {
2018-09-07 12:34:24 -04:00
case 0 :
chunk_appendf ( & trash ,
" frontend %s (#%d): invalid request \n "
" backend %s (#%d) " ,
2022-05-03 05:24:24 -04:00
ctx - > px - > id , ctx - > px - > uuid ,
2020-03-12 10:30:17 -04:00
( es - > oe & & es - > oe - > cap & PR_CAP_BE ) ? es - > oe - > id : " <NONE> " ,
( es - > oe & & es - > oe - > cap & PR_CAP_BE ) ? es - > oe - > uuid : - 1 ) ;
2018-09-07 12:34:24 -04:00
break ;
case 1 :
chunk_appendf ( & trash ,
" backend %s (#%d): invalid response \n "
" frontend %s (#%d) " ,
2022-05-03 05:24:24 -04:00
ctx - > px - > id , ctx - > px - > uuid ,
2020-03-12 10:30:17 -04:00
es - > oe ? es - > oe - > id : " <NONE> " , es - > oe ? es - > oe - > uuid : - 1 ) ;
2018-09-07 12:34:24 -04:00
break ;
}
chunk_appendf ( & trash ,
" , server %s (#%d), event #%u, src %s:%d \n "
" buffer starts at %llu (including %u out), %u free, \n "
" len %u, wraps at %u, error at position %u \n " ,
es - > srv ? es - > srv - > id : " <NONE> " ,
es - > srv ? es - > srv - > puid : - 1 ,
es - > ev_id , pn , port ,
es - > buf_ofs , es - > buf_out ,
global . tune . bufsize - es - > buf_out - es - > buf_len ,
es - > buf_len , es - > buf_wrap , es - > buf_err ) ;
if ( es - > show )
es - > show ( & trash , es ) ;
chunk_appendf ( & trash , " \n " ) ;
2022-05-18 09:07:19 -04:00
if ( applet_putchk ( appctx , & trash ) = = - 1 )
2018-09-07 13:55:44 -04:00
goto cant_send_unlock ;
2022-05-03 05:24:24 -04:00
ctx - > ptr = 0 ;
ctx - > ev_id = es - > ev_id ;
2018-09-07 12:34:24 -04:00
}
2022-05-03 05:24:24 -04:00
if ( ctx - > ev_id ! = es - > ev_id ) {
2018-09-07 12:34:24 -04:00
/* the snapshot changed while we were dumping it */
chunk_appendf ( & trash ,
" WARNING! update detected on this snapshot, dump interrupted. Please re-check! \n " ) ;
2022-05-18 09:07:19 -04:00
if ( applet_putchk ( appctx , & trash ) = = - 1 )
2018-09-07 13:55:44 -04:00
goto cant_send_unlock ;
2018-09-07 12:34:24 -04:00
goto next ;
}
/* OK, ptr >= 0, so we have to dump the current line */
2022-05-03 05:24:24 -04:00
while ( ctx - > ptr < es - > buf_len & & ctx - > ptr < global . tune . bufsize ) {
2018-09-07 12:34:24 -04:00
int newptr ;
int newline ;
2022-05-03 05:24:24 -04:00
newline = ctx - > bol ;
newptr = dump_text_line ( & trash , es - > buf , global . tune . bufsize , es - > buf_len , & newline , ctx - > ptr ) ;
2023-05-05 05:28:45 -04:00
if ( newptr = = ctx - > ptr ) {
sc_need_room ( sc , 0 ) ;
2018-09-07 13:55:44 -04:00
goto cant_send_unlock ;
2023-05-05 05:28:45 -04:00
}
2018-09-07 13:55:44 -04:00
2022-05-18 09:07:19 -04:00
if ( applet_putchk ( appctx , & trash ) = = - 1 )
2018-09-07 13:55:44 -04:00
goto cant_send_unlock ;
2018-09-07 12:34:24 -04:00
2022-05-03 05:24:24 -04:00
ctx - > ptr = newptr ;
ctx - > bol = newline ;
2018-09-07 12:34:24 -04:00
} ;
next :
2022-05-03 05:24:24 -04:00
HA_RWLOCK_RDUNLOCK ( PROXY_LOCK , & ctx - > px - > lock ) ;
ctx - > bol = 0 ;
ctx - > ptr = - 1 ;
ctx - > flag ^ = 1 ;
if ( ! ( ctx - > flag & 1 ) )
ctx - > px = ctx - > px - > next ;
2018-09-07 12:34:24 -04:00
}
/* dump complete */
return 1 ;
2018-09-07 13:55:44 -04:00
cant_send_unlock :
2022-05-03 05:24:24 -04:00
HA_RWLOCK_RDUNLOCK ( PROXY_LOCK , & ctx - > px - > lock ) ;
2018-09-07 13:55:44 -04:00
cant_send :
return 0 ;
2018-09-07 12:34:24 -04:00
}
2016-11-18 20:25:36 -05:00
/* register cli keywords */
static struct cli_kw_list cli_kws = { { } , {
2021-05-07 05:38:37 -04:00
{ { " disable " , " frontend " , NULL } , " disable frontend <frontend> : temporarily disable specific frontend " , cli_parse_disable_frontend , NULL , NULL } ,
{ { " enable " , " frontend " , NULL } , " enable frontend <frontend> : re-enable specific frontend " , cli_parse_enable_frontend , NULL , NULL } ,
{ { " set " , " maxconn " , " frontend " , NULL } , " set maxconn frontend <frontend> <value> : change a frontend's maxconn setting " , cli_parse_set_maxconn_frontend , NULL } ,
{ { " show " , " servers " , " conn " , NULL } , " show servers conn [<backend>] : dump server connections status (all or for a single backend) " , cli_parse_show_servers , cli_io_handler_servers_state } ,
{ { " show " , " servers " , " state " , NULL } , " show servers state [<backend>] : dump volatile server information (all or for a single backend) " , cli_parse_show_servers , cli_io_handler_servers_state } ,
{ { " show " , " backend " , NULL } , " show backend : list backends in the current running config " , NULL , cli_io_handler_show_backend } ,
{ { " shutdown " , " frontend " , NULL } , " shutdown frontend <frontend> : stop a specific frontend " , cli_parse_shutdown_frontend , NULL , NULL } ,
{ { " set " , " dynamic-cookie-key " , " backend " , NULL } , " set dynamic-cookie-key backend <bk> <k> : change a backend secret key for dynamic cookies " , cli_parse_set_dyncookie_key_backend , NULL } ,
{ { " enable " , " dynamic-cookie " , " backend " , NULL } , " enable dynamic-cookie backend <bk> : enable dynamic cookies on a specific backend " , cli_parse_enable_dyncookie_backend , NULL } ,
{ { " disable " , " dynamic-cookie " , " backend " , NULL } , " disable dynamic-cookie backend <bk> : disable dynamic cookies on a specific backend " , cli_parse_disable_dyncookie_backend , NULL } ,
{ { " show " , " errors " , NULL } , " show errors [<px>] [request|response] : report last request and/or response errors for each proxy " , cli_parse_show_errors , cli_io_handler_show_errors , NULL } ,
2016-11-18 20:25:36 -05:00
{ { } , }
} } ;
2018-11-25 13:14:37 -05:00
INITCALL1 ( STG_REGISTER , cli_register_kw , & cli_kws ) ;
2006-06-25 20:48:02 -04:00
/*
* Local variables :
* c - indent - level : 8
* c - basic - offset : 8
* End :
*/