1 /* 2 * include/haproxy/proxy-t.h 3 * This file defines everything related to proxies. 4 * 5 * Copyright (C) 2000-2011 Willy Tarreau - w@1wt.eu 6 * 7 * This library is free software; you can redistribute it and/or 8 * modify it under the terms of the GNU Lesser General Public 9 * License as published by the Free Software Foundation, version 2.1 10 * exclusively. 11 * 12 * This library is distributed in the hope that it will be useful, 13 * but WITHOUT ANY WARRANTY; without even the implied warranty of 14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 15 * Lesser General Public License for more details. 16 * 17 * You should have received a copy of the GNU Lesser General Public 18 * License along with this library; if not, write to the Free Software 19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA 20 */ 21 22 #ifndef _HAPROXY_PROXY_T_H 23 #define _HAPROXY_PROXY_T_H 24 25 #include <sys/types.h> 26 #include <sys/socket.h> 27 #include <netinet/in.h> 28 #include <arpa/inet.h> 29 30 #include <import/eb32tree.h> 31 #include <import/ebpttree.h> 32 33 #include <haproxy/api-t.h> 34 #include <haproxy/arg-t.h> 35 #include <haproxy/backend-t.h> 36 #include <haproxy/counters-t.h> 37 #include <haproxy/freq_ctr-t.h> 38 #include <haproxy/obj_type-t.h> 39 #include <haproxy/server-t.h> 40 #include <haproxy/stats-t.h> 41 #include <haproxy/tcpcheck-t.h> 42 #include <haproxy/thread-t.h> 43 #include <haproxy/uri_auth-t.h> 44 45 /* values for proxy->mode */ 46 enum pr_mode { 47 PR_MODE_TCP = 0, 48 PR_MODE_HTTP, 49 PR_MODE_CLI, 50 PR_MODE_SYSLOG, 51 PR_MODE_PEERS, 52 PR_MODES 53 } __attribute__((packed)); 54 55 enum PR_SRV_STATE_FILE { 56 PR_SRV_STATE_FILE_UNSPEC = 0, 57 PR_SRV_STATE_FILE_NONE, 58 PR_SRV_STATE_FILE_GLOBAL, 59 PR_SRV_STATE_FILE_LOCAL, 60 }; 61 62 63 /* flag values for proxy->cap. This is a bitmask of capabilities supported by the proxy */ 64 #define PR_CAP_NONE 0x0000 65 #define PR_CAP_FE 0x0001 66 #define PR_CAP_BE 0x0002 67 #define PR_CAP_LISTEN (PR_CAP_FE|PR_CAP_BE) 68 69 /* bits for proxy->options */ 70 #define PR_O_REDISP 0x00000001 /* allow reconnection to dispatch in case of errors */ 71 #define PR_O_TRANSP 0x00000002 /* transparent mode : use original DEST as dispatch */ 72 73 /* HTTP server-side reuse */ 74 #define PR_O_REUSE_NEVR 0x00000000 /* never reuse a shared connection */ 75 #define PR_O_REUSE_SAFE 0x00000004 /* only reuse a shared connection when it's safe to do so */ 76 #define PR_O_REUSE_AGGR 0x00000008 /* aggressively reuse a shared connection */ 77 #define PR_O_REUSE_ALWS 0x0000000C /* always reuse a shared connection */ 78 #define PR_O_REUSE_MASK 0x0000000C /* mask to retrieve shared connection preferences */ 79 80 /* unused: 0x10 */ 81 #define PR_O_PREF_LAST 0x00000020 /* prefer last server */ 82 #define PR_O_DISPATCH 0x00000040 /* use dispatch mode */ 83 #define PR_O_FORCED_ID 0x00000080 /* proxy's ID was forced in the configuration */ 84 #define PR_O_FWDFOR 0x00000100 /* conditionally insert x-forwarded-for with client address */ 85 #define PR_O_IGNORE_PRB 0x00000200 /* ignore empty requests (aborts and timeouts) */ 86 #define PR_O_NULLNOLOG 0x00000400 /* a connect without request will not be logged */ 87 #define PR_O_WREQ_BODY 0x00000800 /* always wait for the HTTP request body */ 88 /* unused: 0x1000 */ 89 #define PR_O_FF_ALWAYS 0x00002000 /* always set x-forwarded-for */ 90 #define PR_O_PERSIST 0x00004000 /* server persistence stays effective even when server is down */ 91 #define PR_O_LOGASAP 0x00008000 /* log as soon as possible, without waiting for the stream to complete */ 92 /* unused: 0x00010000 */ 93 #define PR_O_CHK_CACHE 0x00020000 /* require examination of cacheability of the 'set-cookie' field */ 94 #define PR_O_TCP_CLI_KA 0x00040000 /* enable TCP keep-alive on client-side streams */ 95 #define PR_O_TCP_SRV_KA 0x00080000 /* enable TCP keep-alive on server-side streams */ 96 #define PR_O_USE_ALL_BK 0x00100000 /* load-balance between backup servers */ 97 /* unused: 0x00020000 */ 98 #define PR_O_TCP_NOLING 0x00400000 /* disable lingering on client and server connections */ 99 #define PR_O_ABRT_CLOSE 0x00800000 /* immediately abort request when client closes */ 100 101 #define PR_O_HTTP_KAL 0x00000000 /* HTTP keep-alive mode (http-keep-alive) */ 102 #define PR_O_HTTP_CLO 0x01000000 /* HTTP close mode (httpclose) */ 103 #define PR_O_HTTP_SCL 0x02000000 /* HTTP server close mode (http-server-close) */ 104 #define PR_O_HTTP_MODE 0x03000000 /* MASK to retrieve the HTTP mode */ 105 /* unused: 0x04000000 */ 106 107 #define PR_O_TCPCHK_SSL 0x08000000 /* at least one TCPCHECK connect rule requires SSL */ 108 #define PR_O_CONTSTATS 0x10000000 /* continuous counters */ 109 #define PR_O_HTTP_PROXY 0x20000000 /* Enable stream to use HTTP proxy operations */ 110 #define PR_O_DISABLE404 0x40000000 /* Disable a server on a 404 response to a health-check */ 111 #define PR_O_ORGTO 0x80000000 /* insert x-original-to with destination address */ 112 113 /* bits for proxy->options2 */ 114 #define PR_O2_SPLIC_REQ 0x00000001 /* transfer requests using linux kernel's splice() */ 115 #define PR_O2_SPLIC_RTR 0x00000002 /* transfer responses using linux kernel's splice() */ 116 #define PR_O2_SPLIC_AUT 0x00000004 /* automatically use linux kernel's splice() */ 117 #define PR_O2_SPLIC_ANY (PR_O2_SPLIC_REQ|PR_O2_SPLIC_RTR|PR_O2_SPLIC_AUT) 118 #define PR_O2_REQBUG_OK 0x00000008 /* let buggy requests pass through */ 119 #define PR_O2_RSPBUG_OK 0x00000010 /* let buggy responses pass through */ 120 #define PR_O2_NOLOGNORM 0x00000020 /* don't log normal traffic, only errors and retries */ 121 #define PR_O2_LOGERRORS 0x00000040 /* log errors and retries at level LOG_ERR */ 122 #define PR_O2_SMARTACC 0x00000080 /* don't immediately ACK request after accept */ 123 #define PR_O2_SMARTCON 0x00000100 /* don't immediately send empty ACK after connect */ 124 #define PR_O2_RDPC_PRST 0x00000200 /* Actvate rdp cookie analyser */ 125 #define PR_O2_CLFLOG 0x00000400 /* log into clf format */ 126 #define PR_O2_LOGHCHKS 0x00000800 /* log health checks */ 127 #define PR_O2_INDEPSTR 0x00001000 /* independent streams, don't update rex on write */ 128 #define PR_O2_SOCKSTAT 0x00002000 /* collect & provide separate statistics for sockets */ 129 130 #define PR_O2_H1_ADJ_BUGCLI 0x00008000 /* adjust the case of h1 headers of the response for bogus clients */ 131 #define PR_O2_H1_ADJ_BUGSRV 0x00004000 /* adjust the case of h1 headers of the request for bogus servers */ 132 #define PR_O2_NO_H2_UPGRADE 0x00010000 /* disable the implicit H2 upgrades from H1 client connections */ 133 134 #define PR_O2_NODELAY 0x00020000 /* fully interactive mode, never delay outgoing data */ 135 #define PR_O2_USE_PXHDR 0x00040000 /* use Proxy-Connection for proxy requests */ 136 #define PR_O2_CHK_SNDST 0x00080000 /* send the state of each server along with HTTP health checks */ 137 138 #define PR_O2_SRC_ADDR 0x00100000 /* get the source ip and port for logs */ 139 140 #define PR_O2_FAKE_KA 0x00200000 /* pretend we do keep-alive with server eventhough we close */ 141 /* unused : 0x00400000..0x80000000 */ 142 143 /* server health checks */ 144 #define PR_O2_CHK_NONE 0x00000000 /* no L7 health checks configured (TCP by default) */ 145 #define PR_O2_TCPCHK_CHK 0x90000000 /* use TCPCHK check for server health */ 146 #define PR_O2_EXT_CHK 0xA0000000 /* use external command for server health */ 147 /* unused: 0xB0000000 to 0xF000000, reserved for health checks */ 148 #define PR_O2_CHK_ANY 0xF0000000 /* Mask to cover any check */ 149 /* end of proxy->options2 */ 150 151 /* Cookie settings for pr->ck_opts */ 152 #define PR_CK_RW 0x00000001 /* rewrite all direct cookies with the right serverid */ 153 #define PR_CK_IND 0x00000002 /* keep only indirect cookies */ 154 #define PR_CK_INS 0x00000004 /* insert cookies when not accessing a server directly */ 155 #define PR_CK_PFX 0x00000008 /* rewrite all cookies by prefixing the right serverid */ 156 #define PR_CK_ANY (PR_CK_RW | PR_CK_IND | PR_CK_INS | PR_CK_PFX) 157 #define PR_CK_NOC 0x00000010 /* add a 'Cache-control' header with the cookie */ 158 #define PR_CK_POST 0x00000020 /* don't insert cookies for requests other than a POST */ 159 #define PR_CK_PSV 0x00000040 /* cookie ... preserve */ 160 #define PR_CK_HTTPONLY 0x00000080 /* emit the "HttpOnly" attribute */ 161 #define PR_CK_SECURE 0x00000100 /* emit the "Secure" attribute */ 162 #define PR_CK_DYNAMIC 0x00000200 /* create dynamic cookies for each server */ 163 164 /* bits for sticking rules */ 165 #define STK_IS_MATCH 0x00000001 /* match on request fetch */ 166 #define STK_IS_STORE 0x00000002 /* store on request fetch */ 167 #define STK_ON_RSP 0x00000004 /* store on response fetch */ 168 169 /* diff bits for proxy_find_best_match */ 170 #define PR_FBM_MISMATCH_ID 0x01 171 #define PR_FBM_MISMATCH_NAME 0x02 172 #define PR_FBM_MISMATCH_PROXYTYPE 0x04 173 174 /* Bits for the different retry causes */ 175 #define PR_RE_CONN_FAILED 0x00000001 /* Retry if we failed to connect */ 176 #define PR_RE_DISCONNECTED 0x00000002 /* Retry if we got disconnected with no answer */ 177 #define PR_RE_TIMEOUT 0x00000004 /* Retry if we got a server timeout before we got any data */ 178 #define PR_RE_404 0x00000008 /* Retry if we got a 404 */ 179 #define PR_RE_408 0x00000010 /* Retry if we got a 408 */ 180 #define PR_RE_425 0x00000020 /* Retry if we got a 425 */ 181 #define PR_RE_500 0x00000040 /* Retry if we got a 500 */ 182 #define PR_RE_501 0x00000080 /* Retry if we got a 501 */ 183 #define PR_RE_502 0x00000100 /* Retry if we got a 502 */ 184 #define PR_RE_503 0x00000200 /* Retry if we got a 503 */ 185 #define PR_RE_504 0x00000400 /* Retry if we got a 504 */ 186 #define PR_RE_STATUS_MASK (PR_RE_404 | PR_RE_408 | PR_RE_425 | \ 187 PR_RE_425 | PR_RE_500 | PR_RE_501 | \ 188 PR_RE_502 | PR_RE_503 | PR_RE_504) 189 /* 0x00000800, 0x00001000, 0x00002000, 0x00004000 and 0x00008000 unused, 190 * reserved for eventual future status codes 191 */ 192 #define PR_RE_EARLY_ERROR 0x00010000 /* Retry if we failed at sending early data */ 193 #define PR_RE_JUNK_REQUEST 0x00020000 /* We received an incomplete or garbage response */ 194 struct stream; 195 196 struct http_snapshot { 197 unsigned int sid; /* ID of the faulty stream */ 198 unsigned int state; /* message state before the error (when saved) */ 199 unsigned int b_flags; /* buffer flags */ 200 unsigned int s_flags; /* stream flags */ 201 202 unsigned int t_flags; /* transaction flags */ 203 unsigned int m_flags; /* message flags */ 204 unsigned long long m_clen; /* chunk len for this message */ 205 unsigned long long m_blen; /* body len for this message */ 206 }; 207 208 struct h1_snapshot { 209 unsigned int state; /* H1 message state when the error occurred */ 210 unsigned int c_flags; /* H1 connection flags */ 211 unsigned int s_flags; /* H1 stream flags */ 212 unsigned int m_flags; /* H1 message flags */ 213 unsigned long long m_clen; /* chunk len for this message */ 214 unsigned long long m_blen; /* body len for this message */ 215 }; 216 217 union error_snapshot_ctx { 218 struct http_snapshot http; 219 struct h1_snapshot h1; 220 }; 221 222 struct error_snapshot { 223 /**** common part ****/ 224 struct timeval when; /* date of this event, (tv_sec == 0) means "never" */ 225 /* @16 */ 226 void (*show)(struct buffer *, const struct error_snapshot *); /* dump function */ 227 unsigned long long buf_ofs; /* relative position of the buffer's input inside its container */ 228 /* @32 */ 229 unsigned int buf_out; /* pending output bytes _before_ the buffer's input (0..buf->data-1) */ 230 unsigned int buf_len; /* original length of the last invalid request/response (0..buf->data-1-buf_out) */ 231 unsigned int buf_err; /* buffer-relative position where the error was detected (0..len-1) */ 232 unsigned int buf_wrap; /* buffer-relative position where the buffer is expected to wrap (1..buf_size) */ 233 /* @48 */ 234 struct proxy *oe; /* other end = frontend or backend involved */ 235 struct server *srv; /* server associated with the error (or NULL) */ 236 /* @64 */ 237 unsigned int ev_id; /* event number (counter incremented for each capture) */ 238 /* @68: 4 bytes hole here */ 239 struct sockaddr_storage src; /* client's address */ 240 241 /**** protocol-specific part ****/ 242 union error_snapshot_ctx ctx; 243 char buf[VAR_ARRAY]; /* copy of the beginning of the message for bufsize bytes */ 244 }; 245 246 struct proxy { 247 enum obj_type obj_type; /* object type == OBJ_TYPE_PROXY */ 248 char disabled; /* non-zero if disabled or shutdown */ 249 enum pr_mode mode; /* mode = PR_MODE_TCP, PR_MODE_HTTP, ... */ 250 char cap; /* supported capabilities (PR_CAP_*) */ 251 unsigned int maxconn; /* max # of active streams on the frontend */ 252 253 int options; /* PR_O_REDISP, PR_O_TRANSP, ... */ 254 int options2; /* PR_O2_* */ 255 unsigned int ck_opts; /* PR_CK_* (cookie options) */ 256 unsigned int fe_req_ana, be_req_ana; /* bitmap of common request protocol analysers for the frontend and backend */ 257 unsigned int fe_rsp_ana, be_rsp_ana; /* bitmap of common response protocol analysers for the frontend and backend */ 258 unsigned int http_needed; /* non-null if HTTP analyser may be used */ 259 union { 260 struct proxy *be; /* default backend, or NULL if none set */ 261 char *name; /* default backend name during config parse */ 262 } defbe; 263 struct list acl; /* ACL declared on this proxy */ 264 struct list http_req_rules; /* HTTP request rules: allow/deny/... */ 265 struct list http_res_rules; /* HTTP response rules: allow/deny/... */ 266 struct list http_after_res_rules; /* HTTP final response rules: set-header/del-header/... */ 267 struct list redirect_rules; /* content redirecting rules (chained) */ 268 struct list switching_rules; /* content switching rules (chained) */ 269 struct list persist_rules; /* 'force-persist' and 'ignore-persist' rules (chained) */ 270 struct list sticking_rules; /* content sticking rules (chained) */ 271 struct list storersp_rules; /* content store response rules (chained) */ 272 struct list server_rules; /* server switching rules (chained) */ 273 struct { /* TCP request processing */ 274 unsigned int inspect_delay; /* inspection delay */ 275 struct list inspect_rules; /* inspection rules */ 276 struct list l4_rules; /* layer4 rules */ 277 struct list l5_rules; /* layer5 rules */ 278 } tcp_req; 279 struct { /* TCP request processing */ 280 unsigned int inspect_delay; /* inspection delay */ 281 struct list inspect_rules; /* inspection rules */ 282 } tcp_rep; 283 struct server *srv, defsrv; /* known servers; default server configuration */ 284 struct lbprm lbprm; /* load-balancing parameters */ 285 int srv_act, srv_bck; /* # of servers eligible for LB (UP|!checked) AND (enabled+weight!=0) */ 286 int served; /* # of active sessions currently being served */ 287 int cookie_len; /* strlen(cookie_name), computed only once */ 288 char *cookie_domain; /* domain used to insert the cookie */ 289 char *cookie_name; /* name of the cookie to look for */ 290 char *cookie_attrs; /* list of attributes to add to the cookie */ 291 char *dyncookie_key; /* Secret key used to generate dynamic persistent cookies */ 292 unsigned int cookie_maxidle; /* max idle time for this cookie */ 293 unsigned int cookie_maxlife; /* max life time for this cookie */ 294 char *rdp_cookie_name; /* name of the RDP cookie to look for */ 295 char *capture_name; /* beginning of the name of the cookie to capture */ 296 int rdp_cookie_len; /* strlen(rdp_cookie_name), computed only once */ 297 int capture_namelen; /* length of the cookie name to match */ 298 struct uri_auth *uri_auth; /* if non-NULL, the (list of) per-URI authentications */ 299 int capture_len; /* length of the string to be captured */ 300 int max_out_conns; /* Max number of idling connections we keep for a session */ 301 int max_ka_queue; /* 1+maximum requests in queue accepted for reusing a K-A conn (0=none) */ 302 int clitcpka_cnt; /* The maximum number of keepalive probes TCP should send before dropping the connection. (client side) */ 303 int clitcpka_idle; /* The time (in seconds) the connection needs to remain idle before TCP starts sending keepalive probes. (client side) */ 304 int clitcpka_intvl; /* The time (in seconds) between individual keepalive probes. (client side) */ 305 int srvtcpka_cnt; /* The maximum number of keepalive probes TCP should send before dropping the connection. (server side) */ 306 int srvtcpka_idle; /* The time (in seconds) the connection needs to remain idle before TCP starts sending keepalive probes. (server side) */ 307 int srvtcpka_intvl; /* The time (in seconds) between individual keepalive probes. (server side) */ 308 int monitor_uri_len; /* length of the string above. 0 if unused */ 309 char *monitor_uri; /* a special URI to which we respond with HTTP/200 OK */ 310 struct list mon_fail_cond; /* list of conditions to fail monitoring requests (chained) */ 311 struct { /* WARNING! check proxy_reset_timeouts() in proxy.h !!! */ 312 int client; /* client I/O timeout (in ticks) */ 313 int tarpit; /* tarpit timeout, defaults to connect if unspecified */ 314 int queue; /* queue timeout, defaults to connect if unspecified */ 315 int connect; /* connect timeout (in ticks) */ 316 int server; /* server I/O timeout (in ticks) */ 317 int httpreq; /* maximum time for complete HTTP request */ 318 int httpka; /* maximum time for a new HTTP request when using keep-alive */ 319 int check; /* maximum time for complete check */ 320 int tunnel; /* I/O timeout to use in tunnel mode (in ticks) */ 321 int clientfin; /* timeout to apply to client half-closed connections */ 322 int serverfin; /* timeout to apply to server half-closed connections */ 323 } timeout; 324 __decl_thread(HA_RWLOCK_T lock); /* may be taken under the server's lock */ 325 326 char *id, *desc; /* proxy id (name) and description */ 327 struct eb_root pendconns; /* pending connections with no server assigned yet */ 328 int nbpend; /* number of pending connections with no server assigned yet */ 329 int totpend; /* total number of pending connections on this instance (for stats) */ 330 unsigned int queue_idx; /* number of pending connections which have been de-queued */ 331 unsigned int feconn, beconn; /* # of active frontend and backends streams */ 332 struct freq_ctr fe_req_per_sec; /* HTTP requests per second on the frontend */ 333 struct freq_ctr fe_conn_per_sec; /* received connections per second on the frontend */ 334 struct freq_ctr fe_sess_per_sec; /* accepted sessions per second on the frontend (after tcp rules) */ 335 struct freq_ctr be_sess_per_sec; /* sessions per second on the backend */ 336 unsigned int fe_sps_lim; /* limit on new sessions per second on the frontend */ 337 unsigned int fullconn; /* #conns on backend above which servers are used at full load */ 338 unsigned int tot_fe_maxconn; /* #maxconn of frontends linked to that backend, it is used to compute fullconn */ 339 struct in_addr except_net, except_mask; /* don't x-forward-for for this address. FIXME: should support IPv6 */ 340 struct in_addr except_to; /* don't x-original-to for this address. */ 341 struct in_addr except_mask_to; /* the netmask for except_to. */ 342 char *fwdfor_hdr_name; /* header to use - default: "x-forwarded-for" */ 343 char *orgto_hdr_name; /* header to use - default: "x-original-to" */ 344 int fwdfor_hdr_len; /* length of "x-forwarded-for" header */ 345 int orgto_hdr_len; /* length of "x-original-to" header */ 346 char *server_id_hdr_name; /* the header to use to send the server id (name) */ 347 int server_id_hdr_len; /* the length of the id (name) header... name */ 348 int conn_retries; /* maximum number of connect retries */ 349 unsigned int retry_type; /* Type of retry allowed */ 350 int redispatch_after; /* number of retries before redispatch */ 351 unsigned down_trans; /* up-down transitions */ 352 unsigned down_time; /* total time the proxy was down */ 353 time_t last_change; /* last time, when the state was changed */ 354 int (*accept)(struct stream *s); /* application layer's accept() */ 355 struct conn_src conn_src; /* connection source settings */ 356 enum obj_type *default_target; /* default target to use for accepted streams or NULL */ 357 struct proxy *next; 358 struct proxy *next_stkt_ref; /* Link to the list of proxies which refer to the same stick-table. */ 359 360 struct list logsrvs; 361 struct list logformat; /* log_format linked list */ 362 struct list logformat_sd; /* log_format linked list for the RFC5424 structured-data part */ 363 struct buffer log_tag; /* override default syslog tag */ 364 struct ist header_unique_id; /* unique-id header */ 365 struct list format_unique_id; /* unique-id format */ 366 int to_log; /* things to be logged (LW_*) */ 367 int stop_time; /* date to stop listening, when stopping != 0 (int ticks) */ 368 int nb_req_cap, nb_rsp_cap; /* # of headers to be captured */ 369 struct cap_hdr *req_cap; /* chained list of request headers to be captured */ 370 struct cap_hdr *rsp_cap; /* chained list of response headers to be captured */ 371 struct pool_head *req_cap_pool, /* pools of pre-allocated char ** used to build the streams */ 372 *rsp_cap_pool; 373 struct be_counters be_counters; /* backend statistics counters */ 374 struct fe_counters fe_counters; /* frontend statistics counters */ 375 376 struct mt_list listener_queue; /* list of the temporarily limited listeners because of lack of a proxy resource */ 377 struct stktable *table; /* table for storing sticking streams */ 378 379 struct task *task; /* the associated task, mandatory to manage rate limiting, stopping and resource shortage, NULL if disabled */ 380 struct tcpcheck_rules tcpcheck_rules; /* tcp-check send / expect rules */ 381 char *check_command; /* Command to use for external agent checks */ 382 char *check_path; /* PATH environment to use for external agent checks */ 383 struct http_reply *replies[HTTP_ERR_SIZE]; /* HTTP replies for known errors */ 384 unsigned int log_count; /* number of logs produced by the frontend */ 385 int grace; /* grace time after stop request */ 386 int uuid; /* universally unique proxy ID, used for SNMP */ 387 unsigned int backlog; /* force the frontend's listen backlog */ 388 unsigned long bind_proc; /* bitmask of processes using this proxy */ 389 unsigned int li_all; /* total number of listeners attached to this proxy */ 390 unsigned int li_paused; /* total number of listeners paused (LI_PAUSED) */ 391 unsigned int li_bound; /* total number of listeners ready (LI_LISTEN) */ 392 unsigned int li_ready; /* total number of listeners ready (>=LI_READY) */ 393 394 /* warning: these structs are huge, keep them at the bottom */ 395 struct sockaddr_storage dispatch_addr; /* the default address to connect to */ 396 struct error_snapshot *invalid_req, *invalid_rep; /* captures of last errors */ 397 398 /* used only during configuration parsing */ 399 int no_options; /* PR_O_REDISP, PR_O_TRANSP, ... */ 400 int no_options2; /* PR_O2_* */ 401 402 struct { 403 char *file; /* file where the section appears */ 404 struct eb32_node id; /* place in the tree of used IDs */ 405 int line; /* line where the section appears */ 406 struct eb_root used_listener_id;/* list of listener IDs in use */ 407 struct eb_root used_server_id; /* list of server IDs in use */ 408 struct eb_root used_server_name; /* list of server names in use */ 409 struct list bind; /* list of bind settings */ 410 struct list listeners; /* list of listeners belonging to this frontend */ 411 struct list errors; /* list of all custom error files */ 412 struct arg_list args; /* sample arg list that need to be resolved */ 413 struct ebpt_node by_name; /* proxies are stored sorted by name here */ 414 char *logformat_string; /* log format string */ 415 char *lfs_file; /* file name where the logformat string appears (strdup) */ 416 int lfs_line; /* file name where the logformat string appears */ 417 int uif_line; /* file name where the unique-id-format string appears */ 418 char *uif_file; /* file name where the unique-id-format string appears (strdup) */ 419 char *uniqueid_format_string; /* unique-id format string */ 420 char *logformat_sd_string; /* log format string for the RFC5424 structured-data part */ 421 char *lfsd_file; /* file name where the structured-data logformat string for RFC5424 appears (strdup) */ 422 int lfsd_line; /* file name where the structured-data logformat string for RFC5424 appears */ 423 } conf; /* config information */ 424 void *parent; /* parent of the proxy when applicable */ 425 struct comp *comp; /* http compression */ 426 427 struct { 428 union { 429 struct mailers *m; /* Mailer to send email alerts via */ 430 char *name; 431 } mailers; 432 char *from; /* Address to send email alerts from */ 433 char *to; /* Address(es) to send email alerts to */ 434 char *myhostname; /* Identity to use in HELO command sent to mailer */ 435 int level; /* Maximum syslog level of messages to send 436 * email alerts for */ 437 int set; /* True if email_alert settings are present */ 438 struct email_alertq *queues; /* per-mailer alerts queues */ 439 } email_alert; 440 441 int load_server_state_from_file; /* location of the file containing server state. 442 * flag PR_SRV_STATE_FILE_* */ 443 char *server_state_file_name; /* used when load_server_state_from_file is set to 444 * PR_SRV_STATE_FILE_LOCAL. Give a specific file name for 445 * this backend. If not specified or void, then the backend 446 * name is used 447 */ 448 struct list filter_configs; /* list of the filters that are declared on this proxy */ 449 450 EXTRA_COUNTERS(extra_counters_fe); 451 EXTRA_COUNTERS(extra_counters_be); 452 }; 453 454 struct switching_rule { 455 struct list list; /* list linked to from the proxy */ 456 struct acl_cond *cond; /* acl condition to meet */ 457 int dynamic; /* this is a dynamic rule using the logformat expression */ 458 union { 459 struct proxy *backend; /* target backend */ 460 char *name; /* target backend name during config parsing */ 461 struct list expr; /* logformat expression to use for dynamic rules */ 462 } be; 463 char *file; 464 int line; 465 }; 466 467 struct server_rule { 468 struct list list; /* list linked to from the proxy */ 469 struct acl_cond *cond; /* acl condition to meet */ 470 int dynamic; 471 union { 472 struct server *ptr; /* target server */ 473 char *name; /* target server name during config parsing */ 474 } srv; 475 struct list expr; /* logformat expression to use for dynamic rules */ 476 char *file; 477 int line; 478 }; 479 480 struct persist_rule { 481 struct list list; /* list linked to from the proxy */ 482 struct acl_cond *cond; /* acl condition to meet */ 483 int type; 484 }; 485 486 struct sticking_rule { 487 struct list list; /* list linked to from the proxy */ 488 struct acl_cond *cond; /* acl condition to meet */ 489 struct sample_expr *expr; /* fetch expr to fetch key */ 490 int flags; /* STK_* */ 491 union { 492 struct stktable *t; /* target table */ 493 char *name; /* target table name during config parsing */ 494 } table; 495 }; 496 497 498 struct redirect_rule { 499 struct list list; /* list linked to from the proxy */ 500 struct acl_cond *cond; /* acl condition to meet */ 501 int type; 502 int rdr_len; 503 char *rdr_str; 504 struct list rdr_fmt; 505 int code; 506 unsigned int flags; 507 int cookie_len; 508 char *cookie_str; 509 }; 510 511 /* some of the most common options which are also the easiest to handle */ 512 struct cfg_opt { 513 const char *name; 514 unsigned int val; 515 unsigned int cap; 516 unsigned int checks; 517 unsigned int mode; 518 }; 519 520 #endif /* _HAPROXY_PROXY_T_H */ 521 522 /* 523 * Local variables: 524 * c-indent-level: 8 525 * c-basic-offset: 8 526 * End: 527 */ 528