1 /*
2  * include/types/proxy.h
3  * This file defines everything related to proxies.
4  *
5  * Copyright (C) 2000-2011 Willy Tarreau - w@1wt.eu
6  *
7  * This library is free software; you can redistribute it and/or
8  * modify it under the terms of the GNU Lesser General Public
9  * License as published by the Free Software Foundation, version 2.1
10  * exclusively.
11  *
12  * This library is distributed in the hope that it will be useful,
13  * but WITHOUT ANY WARRANTY; without even the implied warranty of
14  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
15  * Lesser General Public License for more details.
16  *
17  * You should have received a copy of the GNU Lesser General Public
18  * License along with this library; if not, write to the Free Software
19  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
20  */
21 
22 #ifndef _TYPES_PROXY_H
23 #define _TYPES_PROXY_H
24 
25 #include <sys/types.h>
26 #include <sys/socket.h>
27 #include <netinet/in.h>
28 #include <arpa/inet.h>
29 
30 #include <common/chunk.h>
31 #include <common/config.h>
32 #include <common/http.h>
33 #include <common/mini-clist.h>
34 #include <common/regex.h>
35 #include <common/tools.h>
36 #include <common/hathreads.h>
37 
38 #include <eb32tree.h>
39 #include <ebistree.h>
40 
41 #include <types/acl.h>
42 #include <types/backend.h>
43 #include <types/counters.h>
44 #include <types/filters.h>
45 #include <types/freq_ctr.h>
46 #include <types/listener.h>
47 #include <types/log.h>
48 #include <types/obj_type.h>
49 #include <types/sample.h>
50 #include <types/server.h>
51 #include <types/stick_table.h>
52 
53 /* values for proxy->state */
54 enum pr_state {
55 	PR_STNEW = 0,           /* proxy has not been initialized yet */
56 	PR_STREADY,             /* proxy has been initialized and is ready */
57 	PR_STFULL,              /* frontend is full (maxconn reached) */
58 	PR_STPAUSED,            /* frontend is paused (during hot restart) */
59 	PR_STSTOPPED,           /* proxy is stopped (end of a restart) */
60 	PR_STERROR,             /* proxy experienced an unrecoverable error */
61 } __attribute__((packed));
62 
63 /* values for proxy->mode */
64 enum pr_mode {
65 	PR_MODE_TCP = 0,
66 	PR_MODE_HTTP,
67 	PR_MODE_HEALTH,
68 	PR_MODE_CLI,
69 } __attribute__((packed));
70 
71 enum PR_SRV_STATE_FILE {
72 	PR_SRV_STATE_FILE_UNSPEC = 0,
73 	PR_SRV_STATE_FILE_NONE,
74 	PR_SRV_STATE_FILE_GLOBAL,
75 	PR_SRV_STATE_FILE_LOCAL,
76 };
77 
78 
79 /* flag values for proxy->cap. This is a bitmask of capabilities supported by the proxy */
80 #define PR_CAP_NONE    0x0000
81 #define PR_CAP_FE      0x0001
82 #define PR_CAP_BE      0x0002
83 #define PR_CAP_LISTEN  (PR_CAP_FE|PR_CAP_BE)
84 
85 /* bits for proxy->options */
86 #define PR_O_REDISP     0x00000001      /* allow reconnection to dispatch in case of errors */
87 #define PR_O_TRANSP     0x00000002      /* transparent mode : use original DEST as dispatch */
88 
89 /* HTTP server-side reuse */
90 #define PR_O_REUSE_NEVR 0x00000000      /* never reuse a shared connection */
91 #define PR_O_REUSE_SAFE 0x00000004      /* only reuse a shared connection when it's safe to do so */
92 #define PR_O_REUSE_AGGR 0x00000008      /* aggressively reuse a shared connection */
93 #define PR_O_REUSE_ALWS 0x0000000C      /* always reuse a shared connection */
94 #define PR_O_REUSE_MASK 0x0000000C      /* mask to retrieve shared connection preferences */
95 
96 /* unused: 0x10 */
97 #define PR_O_PREF_LAST  0x00000020      /* prefer last server */
98 #define PR_O_DISPATCH   0x00000040      /* use dispatch mode */
99 #define PR_O_FORCED_ID  0x00000080      /* proxy's ID was forced in the configuration */
100 #define PR_O_FWDFOR     0x00000100      /* conditionally insert x-forwarded-for with client address */
101 #define PR_O_IGNORE_PRB 0x00000200      /* ignore empty requests (aborts and timeouts) */
102 #define PR_O_NULLNOLOG  0x00000400      /* a connect without request will not be logged */
103 #define PR_O_WREQ_BODY  0x00000800      /* always wait for the HTTP request body */
104 /* unused: 0x1000 */
105 #define PR_O_FF_ALWAYS  0x00002000      /* always set x-forwarded-for */
106 #define PR_O_PERSIST    0x00004000      /* server persistence stays effective even when server is down */
107 #define PR_O_LOGASAP    0x00008000      /* log as soon as possible, without waiting for the stream to complete */
108 /* unused: 0x00010000 */
109 #define PR_O_CHK_CACHE  0x00020000      /* require examination of cacheability of the 'set-cookie' field */
110 #define PR_O_TCP_CLI_KA 0x00040000      /* enable TCP keep-alive on client-side streams */
111 #define PR_O_TCP_SRV_KA 0x00080000      /* enable TCP keep-alive on server-side streams */
112 #define PR_O_USE_ALL_BK 0x00100000      /* load-balance between backup servers */
113 /* unused: 0x00020000 */
114 #define PR_O_TCP_NOLING 0x00400000      /* disable lingering on client and server connections */
115 #define PR_O_ABRT_CLOSE 0x00800000      /* immediately abort request when client closes */
116 
117 #define PR_O_HTTP_KAL   0x00000000      /* HTTP keep-alive mode (http-keep-alive) */
118 #define PR_O_HTTP_CLO   0x01000000      /* HTTP close mode (httpclose) */
119 #define PR_O_HTTP_SCL   0x02000000      /* HTTP server close mode (http-server-close) */
120 #define PR_O_HTTP_TUN   0x04000000      /* HTTP tunnel mode : no analysis past first request/response */
121 #define PR_O_HTTP_MODE  0x07000000      /* MASK to retrieve the HTTP mode */
122 
123 #define PR_O_TCPCHK_SSL 0x08000000	/* at least one TCPCHECK connect rule requires SSL */
124 #define PR_O_CONTSTATS	0x10000000	/* continuous counters */
125 #define PR_O_HTTP_PROXY 0x20000000	/* Enable stream to use HTTP proxy operations */
126 #define PR_O_DISABLE404 0x40000000      /* Disable a server on a 404 response to a health-check */
127 #define PR_O_ORGTO      0x80000000      /* insert x-original-to with destination address */
128 
129 /* bits for proxy->options2 */
130 #define PR_O2_SPLIC_REQ	0x00000001      /* transfer requests using linux kernel's splice() */
131 #define PR_O2_SPLIC_RTR	0x00000002      /* transfer responses using linux kernel's splice() */
132 #define PR_O2_SPLIC_AUT	0x00000004      /* automatically use linux kernel's splice() */
133 #define PR_O2_SPLIC_ANY	(PR_O2_SPLIC_REQ|PR_O2_SPLIC_RTR|PR_O2_SPLIC_AUT)
134 #define PR_O2_REQBUG_OK	0x00000008      /* let buggy requests pass through */
135 #define PR_O2_RSPBUG_OK	0x00000010      /* let buggy responses pass through */
136 #define PR_O2_NOLOGNORM	0x00000020      /* don't log normal traffic, only errors and retries */
137 #define PR_O2_LOGERRORS	0x00000040      /* log errors and retries at level LOG_ERR */
138 #define PR_O2_SMARTACC 	0x00000080      /* don't immediately ACK request after accept */
139 #define PR_O2_SMARTCON 	0x00000100      /* don't immediately send empty ACK after connect */
140 #define PR_O2_RDPC_PRST	0x00000200      /* Actvate rdp cookie analyser */
141 #define PR_O2_CLFLOG	0x00000400      /* log into clf format */
142 #define PR_O2_LOGHCHKS	0x00000800	/* log health checks */
143 #define PR_O2_INDEPSTR	0x00001000	/* independent streams, don't update rex on write */
144 #define PR_O2_SOCKSTAT	0x00002000	/* collect & provide separate statistics for sockets */
145 
146 #define PR_O2_H1_ADJ_BUGCLI 0x00008000 /* adjust the case of h1 headers of the response for bogus clients */
147 #define PR_O2_H1_ADJ_BUGSRV 0x00004000 /* adjust the case of h1 headers of the request for bogus servers */
148 #define PR_O2_NO_H2_UPGRADE 0x00010000 /* disable the implicit H2 upgrades from H1 client connections */
149 
150 #define PR_O2_NODELAY   0x00020000      /* fully interactive mode, never delay outgoing data */
151 #define PR_O2_USE_PXHDR 0x00040000      /* use Proxy-Connection for proxy requests */
152 #define PR_O2_CHK_SNDST 0x00080000      /* send the state of each server along with HTTP health checks */
153 
154 #define PR_O2_SRC_ADDR	0x00100000	/* get the source ip and port for logs */
155 
156 #define PR_O2_FAKE_KA   0x00200000      /* pretend we do keep-alive with server eventhough we close */
157 #define PR_O2_USE_HTX   0x00400000      /* use the HTX representation for the HTTP protocol */
158 
159 #define PR_O2_EXP_NONE  0x00000000      /* http-check : no expect rule */
160 #define PR_O2_EXP_STS   0x00800000      /* http-check expect status */
161 #define PR_O2_EXP_RSTS  0x01000000      /* http-check expect rstatus */
162 #define PR_O2_EXP_STR   0x01800000      /* http-check expect string */
163 #define PR_O2_EXP_RSTR  0x02000000      /* http-check expect rstring */
164 #define PR_O2_EXP_TYPE  0x03800000      /* mask for http-check expect type */
165 #define PR_O2_EXP_INV   0x04000000      /* http-check expect !<rule> */
166 /* unused: 0x08000000 */
167 
168 /* server health checks */
169 #define PR_O2_CHK_NONE  0x00000000      /* no L7 health checks configured (TCP by default) */
170 #define PR_O2_PGSQL_CHK 0x10000000      /* use PGSQL check for server health */
171 #define PR_O2_REDIS_CHK 0x20000000      /* use LDAP check for server health */
172 #define PR_O2_SMTP_CHK  0x30000000      /* use SMTP EHLO check for server health - pvandijk@vision6.com.au */
173 #define PR_O2_HTTP_CHK  0x40000000      /* use HTTP 'OPTIONS' method to check server health */
174 #define PR_O2_MYSQL_CHK 0x50000000      /* use MYSQL check for server health */
175 #define PR_O2_LDAP_CHK  0x60000000      /* use LDAP check for server health */
176 #define PR_O2_SSL3_CHK  0x70000000      /* use SSLv3 CLIENT_HELLO packets for server health */
177 #define PR_O2_LB_AGENT_CHK 0x80000000   /* use a TCP connection to obtain a metric of server health */
178 #define PR_O2_TCPCHK_CHK 0x90000000     /* use TCPCHK check for server health */
179 #define PR_O2_EXT_CHK   0xA0000000      /* use external command for server health */
180 #define PR_O2_SPOP_CHK  0xB0000000      /* use SPOP for server health */
181 /* unused: 0xC0000000 to 0xF000000, reserved for health checks */
182 #define PR_O2_CHK_ANY   0xF0000000      /* Mask to cover any check */
183 /* end of proxy->options2 */
184 
185 /* Cookie settings for pr->ck_opts */
186 #define PR_CK_RW        0x00000001      /* rewrite all direct cookies with the right serverid */
187 #define PR_CK_IND       0x00000002      /* keep only indirect cookies */
188 #define PR_CK_INS       0x00000004      /* insert cookies when not accessing a server directly */
189 #define PR_CK_PFX       0x00000008      /* rewrite all cookies by prefixing the right serverid */
190 #define PR_CK_ANY       (PR_CK_RW | PR_CK_IND | PR_CK_INS | PR_CK_PFX)
191 #define PR_CK_NOC       0x00000010      /* add a 'Cache-control' header with the cookie */
192 #define PR_CK_POST      0x00000020      /* don't insert cookies for requests other than a POST */
193 #define PR_CK_PSV       0x00000040      /* cookie ... preserve */
194 #define PR_CK_HTTPONLY  0x00000080      /* emit the "HttpOnly" attribute */
195 #define PR_CK_SECURE    0x00000100      /* emit the "Secure" attribute */
196 #define PR_CK_DYNAMIC   0x00000200	/* create dynamic cookies for each server */
197 
198 /* bits for sticking rules */
199 #define STK_IS_MATCH	0x00000001	/* match on request fetch */
200 #define STK_IS_STORE	0x00000002	/* store on request fetch */
201 #define STK_ON_RSP	0x00000004	/* store on response fetch */
202 
203 /* diff bits for proxy_find_best_match */
204 #define PR_FBM_MISMATCH_ID        0x01
205 #define PR_FBM_MISMATCH_NAME      0x02
206 #define PR_FBM_MISMATCH_PROXYTYPE 0x04
207 
208 /* Bits for the different retry causes */
209 #define PR_RE_CONN_FAILED         0x00000001 /* Retry if we failed to connect */
210 #define PR_RE_DISCONNECTED        0x00000002 /* Retry if we got disconnected with no answer */
211 #define PR_RE_TIMEOUT             0x00000004 /* Retry if we got a server timeout before we got any data */
212 #define PR_RE_404                 0x00000008 /* Retry if we got a 404 */
213 #define PR_RE_408                 0x00000010 /* Retry if we got a 408 */
214 #define PR_RE_425                 0x00000020 /* Retry if we got a 425 */
215 #define PR_RE_500                 0x00000040 /* Retry if we got a 500 */
216 #define PR_RE_501                 0x00000080 /* Retry if we got a 501 */
217 #define PR_RE_502                 0x00000100 /* Retry if we got a 502 */
218 #define PR_RE_503                 0x00000200 /* Retry if we got a 503 */
219 #define PR_RE_504                 0x00000400 /* Retry if we got a 504 */
220 #define PR_RE_STATUS_MASK         (PR_RE_404 | PR_RE_408 | PR_RE_425 | \
221                                    PR_RE_425 | PR_RE_500 | PR_RE_501 | \
222                                    PR_RE_502 | PR_RE_503 | PR_RE_504)
223 /* 0x00000800, 0x00001000, 0x00002000, 0x00004000 and 0x00008000 unused,
224  * reserved for eventual future status codes
225  */
226 #define PR_RE_EARLY_ERROR         0x00010000 /* Retry if we failed at sending early data */
227 #define PR_RE_JUNK_REQUEST        0x00020000 /* We received an incomplete or garbage response */
228 struct stream;
229 
230 struct http_snapshot {
231 	unsigned int sid;		/* ID of the faulty stream */
232 	unsigned int state;		/* message state before the error (when saved) */
233 	unsigned int b_flags;		/* buffer flags */
234 	unsigned int s_flags;		/* stream flags */
235 
236 	unsigned int t_flags;		/* transaction flags */
237 	unsigned int m_flags;		/* message flags */
238 	unsigned long long m_clen;	/* chunk len for this message */
239 	unsigned long long m_blen;	/* body len for this message */
240 };
241 
242 struct h1_snapshot {
243 	unsigned int state;		/* H1 message state when the error occurred */
244 	unsigned int c_flags;		/* H1 connection flags */
245 	unsigned int s_flags;		/* H1 stream flags */
246 	unsigned int m_flags;		/* H1 message flags */
247 	unsigned long long m_clen;	/* chunk len for this message */
248 	unsigned long long m_blen;	/* body len for this message */
249 };
250 
251 union error_snapshot_ctx {
252 	struct http_snapshot http;
253 	struct h1_snapshot h1;
254 };
255 
256 struct error_snapshot {
257 	/**** common part ****/
258 	struct timeval when;            /* date of this event, (tv_sec == 0) means "never" */
259 	/* @16 */
260 	void (*show)(struct buffer *, const struct error_snapshot *); /* dump function */
261 	unsigned long long buf_ofs;     /* relative position of the buffer's input inside its container */
262 	/* @32 */
263 	unsigned int buf_out;           /* pending output bytes _before_ the buffer's input (0..buf->data-1) */
264 	unsigned int buf_len;           /* original length of the last invalid request/response (0..buf->data-1-buf_out) */
265 	unsigned int buf_err;           /* buffer-relative position where the error was detected (0..len-1) */
266 	unsigned int buf_wrap;          /* buffer-relative position where the buffer is expected to wrap (1..buf_size) */
267 	/* @48 */
268 	struct proxy *oe;               /* other end = frontend or backend involved */
269 	struct server *srv;             /* server associated with the error (or NULL) */
270 	/* @64 */
271 	unsigned int ev_id;             /* event number (counter incremented for each capture) */
272 	/* @68: 4 bytes hole here */
273 	struct sockaddr_storage src;    /* client's address */
274 
275 	/**** protocol-specific part ****/
276 	union error_snapshot_ctx ctx;
277 	char buf[0];                    /* copy of the beginning of the message for bufsize bytes */
278 };
279 
280 struct email_alert {
281 	struct list list;
282 	struct list tcpcheck_rules;
283 	struct server *srv;
284 };
285 
286 struct email_alertq {
287 	struct list email_alerts;
288 	struct check check;		/* Email alerts are implemented using existing check
289 					 * code even though they are not checks. This structure
290 					 * is as a parameter to the check code.
291 					 * Each check corresponds to a mailer */
292 	__decl_hathreads(HA_SPINLOCK_T lock);
293 };
294 
295 struct proxy {
296 	enum obj_type obj_type;                 /* object type == OBJ_TYPE_PROXY */
297 	enum pr_state state;                    /* proxy state, one of PR_* */
298 	enum pr_mode mode;                      /* mode = PR_MODE_TCP, PR_MODE_HTTP or PR_MODE_HEALTH */
299 	char cap;                               /* supported capabilities (PR_CAP_*) */
300 	unsigned int maxconn;                   /* max # of active streams on the frontend */
301 
302 	int options;				/* PR_O_REDISP, PR_O_TRANSP, ... */
303 	int options2;				/* PR_O2_* */
304 	int max_out_conns;                      /* Max number of idling connections we keep for a session */
305 	struct in_addr mon_net, mon_mask;	/* don't forward connections from this net (network order) FIXME: should support IPv6 */
306 	unsigned int ck_opts;			/* PR_CK_* (cookie options) */
307 	unsigned int fe_req_ana, be_req_ana;	/* bitmap of common request protocol analysers for the frontend and backend */
308 	unsigned int fe_rsp_ana, be_rsp_ana;	/* bitmap of common response protocol analysers for the frontend and backend */
309 	unsigned int http_needed;               /* non-null if HTTP analyser may be used */
310 	union {
311 		struct proxy *be;		/* default backend, or NULL if none set */
312 		char *name;			/* default backend name during config parse */
313 	} defbe;
314 	struct list acl;                        /* ACL declared on this proxy */
315 	struct list http_req_rules;		/* HTTP request rules: allow/deny/... */
316 	struct list http_res_rules;		/* HTTP response rules: allow/deny/... */
317 	struct list block_rules;                /* http-request block rules to be inserted before other ones */
318 	struct list redirect_rules;             /* content redirecting rules (chained) */
319 	struct list switching_rules;            /* content switching rules (chained) */
320 	struct list persist_rules;		/* 'force-persist' and 'ignore-persist' rules (chained) */
321 	struct list sticking_rules;             /* content sticking rules (chained) */
322 	struct list storersp_rules;             /* content store response rules (chained) */
323 	struct list server_rules;               /* server switching rules (chained) */
324 	struct {                                /* TCP request processing */
325 		unsigned int inspect_delay;     /* inspection delay */
326 		struct list inspect_rules;      /* inspection rules */
327 		struct list l4_rules;           /* layer4 rules */
328 		struct list l5_rules;           /* layer5 rules */
329 	} tcp_req;
330 	struct {                                /* TCP request processing */
331 		unsigned int inspect_delay;     /* inspection delay */
332 		struct list inspect_rules;      /* inspection rules */
333 	} tcp_rep;
334 	struct server *srv, defsrv;		/* known servers; default server configuration */
335 	struct lbprm lbprm;			/* load-balancing parameters */
336 	int srv_act, srv_bck;			/* # of servers eligible for LB (UP|!checked) AND (enabled+weight!=0) */
337 	int served;				/* # of active sessions currently being served */
338 	int  cookie_len;			/* strlen(cookie_name), computed only once */
339 	char *cookie_domain;			/* domain used to insert the cookie */
340 	char *cookie_name;			/* name of the cookie to look for */
341 	char *cookie_attrs;                     /* list of attributes to add to the cookie */
342 	char *dyncookie_key;			/* Secret key used to generate dynamic persistent cookies */
343 	unsigned int cookie_maxidle;		/* max idle time for this cookie */
344 	unsigned int cookie_maxlife;		/* max life time for this cookie */
345 	char *rdp_cookie_name;			/* name of the RDP cookie to look for */
346 	int  rdp_cookie_len;			/* strlen(rdp_cookie_name), computed only once */
347 	char *capture_name;			/* beginning of the name of the cookie to capture */
348 	int  capture_namelen;			/* length of the cookie name to match */
349 	int  capture_len;			/* length of the string to be captured */
350 	struct uri_auth *uri_auth;		/* if non-NULL, the (list of) per-URI authentications */
351 	int max_ka_queue;			/* 1+maximum requests in queue accepted for reusing a K-A conn (0=none) */
352 	int monitor_uri_len;			/* length of the string above. 0 if unused */
353 	char *monitor_uri;			/* a special URI to which we respond with HTTP/200 OK */
354 	struct list mon_fail_cond;              /* list of conditions to fail monitoring requests (chained) */
355 	struct {				/* WARNING! check proxy_reset_timeouts() in proxy.h !!! */
356 		int client;                     /* client I/O timeout (in ticks) */
357 		int tarpit;                     /* tarpit timeout, defaults to connect if unspecified */
358 		int queue;                      /* queue timeout, defaults to connect if unspecified */
359 		int connect;                    /* connect timeout (in ticks) */
360 		int server;                     /* server I/O timeout (in ticks) */
361 		int httpreq;                    /* maximum time for complete HTTP request */
362 		int httpka;                     /* maximum time for a new HTTP request when using keep-alive */
363 		int check;                      /* maximum time for complete check */
364 		int tunnel;                     /* I/O timeout to use in tunnel mode (in ticks) */
365 		int clientfin;                  /* timeout to apply to client half-closed connections */
366 		int serverfin;                  /* timeout to apply to server half-closed connections */
367 	} timeout;
368 	char *id, *desc;			/* proxy id (name) and description */
369 	struct eb_root pendconns;		/* pending connections with no server assigned yet */
370 	int nbpend;				/* number of pending connections with no server assigned yet */
371 	int totpend;				/* total number of pending connections on this instance (for stats) */
372 	unsigned int queue_idx;			/* number of pending connections which have been de-queued */
373 	unsigned int feconn, beconn;		/* # of active frontend and backends streams */
374 	struct freq_ctr fe_req_per_sec;		/* HTTP requests per second on the frontend */
375 	struct freq_ctr fe_conn_per_sec;	/* received connections per second on the frontend */
376 	struct freq_ctr fe_sess_per_sec;	/* accepted sessions per second on the frontend (after tcp rules) */
377 	struct freq_ctr be_sess_per_sec;	/* sessions per second on the backend */
378 	unsigned int fe_sps_lim;		/* limit on new sessions per second on the frontend */
379 	unsigned int fullconn;			/* #conns on backend above which servers are used at full load */
380 	unsigned int tot_fe_maxconn;		/* #maxconn of frontends linked to that backend, it is used to compute fullconn */
381 	struct in_addr except_net, except_mask; /* don't x-forward-for for this address. FIXME: should support IPv6 */
382 	struct in_addr except_to;		/* don't x-original-to for this address. */
383 	struct in_addr except_mask_to;		/* the netmask for except_to. */
384 	char *fwdfor_hdr_name;			/* header to use - default: "x-forwarded-for" */
385 	char *orgto_hdr_name;			/* header to use - default: "x-original-to" */
386 	int fwdfor_hdr_len;			/* length of "x-forwarded-for" header */
387 	int orgto_hdr_len;			/* length of "x-original-to" header */
388 	char *server_id_hdr_name;                   /* the header to use to send the server id (name) */
389 	int server_id_hdr_len;                      /* the length of the id (name) header... name */
390 	int conn_retries;			/* maximum number of connect retries */
391 	unsigned int retry_type;                /* Type of retry allowed */
392 	int redispatch_after;			/* number of retries before redispatch */
393 	unsigned down_trans;			/* up-down transitions */
394 	unsigned down_time;			/* total time the proxy was down */
395 	unsigned int log_count;			/* number of logs produced by the frontend */
396 	time_t last_change;			/* last time, when the state was changed */
397 	int (*accept)(struct stream *s);       /* application layer's accept() */
398 	struct conn_src conn_src;               /* connection source settings */
399 	enum obj_type *default_target;		/* default target to use for accepted streams or NULL */
400 	struct proxy *next;
401 	struct proxy *next_stkt_ref;    /* Link to the list of proxies which refer to the same stick-table. */
402 
403 	struct list logsrvs;
404 	struct list logformat; 			/* log_format linked list */
405 	struct list logformat_sd;		/* log_format linked list for the RFC5424 structured-data part */
406 	struct buffer log_tag;                   /* override default syslog tag */
407 	char *header_unique_id; 		/* unique-id header */
408 	struct list format_unique_id;		/* unique-id format */
409 	int to_log;				/* things to be logged (LW_*) */
410 	int stop_time;                          /* date to stop listening, when stopping != 0 (int ticks) */
411 	struct hdr_exp *req_exp;		/* regular expressions for request headers */
412 	struct hdr_exp *rsp_exp;		/* regular expressions for response headers */
413 	int nb_req_cap, nb_rsp_cap;		/* # of headers to be captured */
414 	struct cap_hdr *req_cap;		/* chained list of request headers to be captured */
415 	struct cap_hdr *rsp_cap;		/* chained list of response headers to be captured */
416 	struct pool_head *req_cap_pool,		/* pools of pre-allocated char ** used to build the streams */
417 	                 *rsp_cap_pool;
418 	struct list req_add, rsp_add;           /* headers to be added */
419 	struct be_counters be_counters;		/* backend statistics counters */
420 	struct fe_counters fe_counters;		/* frontend statistics counters */
421 
422 	struct list listener_queue;		/* list of the temporarily limited listeners because of lack of a proxy resource */
423 	struct stktable *table;			/* table for storing sticking streams */
424 
425 	struct task *task;			/* the associated task, mandatory to manage rate limiting, stopping and resource shortage, NULL if disabled */
426 	struct list tcpcheck_rules;		/* tcp-check send / expect rules */
427 	int grace;				/* grace time after stop request */
428 	int check_len;				/* Length of the HTTP or SSL3 request */
429 	char *check_req;			/* HTTP or SSL request to use for PR_O_HTTP_CHK|PR_O_SSL3_CHK */
430 	int check_body_len;                     /* Length of the request body for HTTP checks */
431 	char *check_hdrs;                       /* Request headers for HTTP cheks */
432 	int check_hdrs_len;                     /* Length of the headers for HTTP checks */
433 	char *check_body;                       /* Request body for HTTP cheks */
434 	char *check_command;			/* Command to use for external agent checks */
435 	char *check_path;			/* PATH environment to use for external agent checks */
436 	char *expect_str;			/* http-check expected content : string or text version of the regex */
437 	struct my_regex *expect_regex;		/* http-check expected content */
438 	struct buffer errmsg[HTTP_ERR_SIZE];	/* default or customized error messages for known errors */
439 	int uuid;				/* universally unique proxy ID, used for SNMP */
440 	unsigned int backlog;			/* force the frontend's listen backlog */
441 	unsigned long bind_proc;		/* bitmask of processes using this proxy */
442 
443 	/* warning: these structs are huge, keep them at the bottom */
444 	struct sockaddr_storage dispatch_addr;	/* the default address to connect to */
445 	struct error_snapshot *invalid_req, *invalid_rep; /* captures of last errors */
446 
447 	/* used only during configuration parsing */
448 	int no_options;				/* PR_O_REDISP, PR_O_TRANSP, ... */
449 	int no_options2;			/* PR_O2_* */
450 
451 	struct {
452 		char *file;			/* file where the section appears */
453 		struct eb32_node id;		/* place in the tree of used IDs */
454 		int line;			/* line where the section appears */
455 		struct eb_root used_listener_id;/* list of listener IDs in use */
456 		struct eb_root used_server_id;	/* list of server IDs in use */
457 		struct eb_root used_server_name; /* list of server names in use */
458 		struct list bind;		/* list of bind settings */
459 		struct list listeners;		/* list of listeners belonging to this frontend */
460 		struct arg_list args;           /* sample arg list that need to be resolved */
461 		struct ebpt_node by_name;       /* proxies are stored sorted by name here */
462 		char *logformat_string;		/* log format string */
463 		char *lfs_file;                 /* file name where the logformat string appears (strdup) */
464 		int   lfs_line;                 /* file name where the logformat string appears */
465 		int   uif_line;                 /* file name where the unique-id-format string appears */
466 		char *uif_file;                 /* file name where the unique-id-format string appears (strdup) */
467 		char *uniqueid_format_string;	/* unique-id format string */
468 		char *logformat_sd_string;	/* log format string for the RFC5424 structured-data part */
469 		char *lfsd_file;		/* file name where the structured-data logformat string for RFC5424 appears (strdup) */
470 		int  lfsd_line;			/* file name where the structured-data logformat string for RFC5424 appears */
471 	} conf;					/* config information */
472 	void *parent;				/* parent of the proxy when applicable */
473 	struct comp *comp;			/* http compression */
474 
475 	struct {
476 		union {
477 			struct mailers *m;	/* Mailer to send email alerts via */
478 			char *name;
479 		} mailers;
480 		char *from;			/* Address to send email alerts from */
481 		char *to;			/* Address(es) to send email alerts to */
482 		char *myhostname;		/* Identity to use in HELO command sent to mailer */
483 		int level;			/* Maximum syslog level of messages to send
484 						 * email alerts for */
485 		int set;			/* True if email_alert settings are present */
486 		struct email_alertq *queues;	/* per-mailer alerts queues */
487 	} email_alert;
488 
489 	int load_server_state_from_file;	/* location of the file containing server state.
490 						 * flag PR_SRV_STATE_FILE_* */
491 	char *server_state_file_name;		/* used when load_server_state_from_file is set to
492 						 * PR_SRV_STATE_FILE_LOCAL. Give a specific file name for
493 						 * this backend. If not specified or void, then the backend
494 						 * name is used
495 						 */
496 	struct list filter_configs;		/* list of the filters that are declared on this proxy */
497 	__decl_hathreads(HA_SPINLOCK_T lock);   /* may be taken under the server's lock */
498 };
499 
500 struct switching_rule {
501 	struct list list;			/* list linked to from the proxy */
502 	struct acl_cond *cond;			/* acl condition to meet */
503 	int dynamic;				/* this is a dynamic rule using the logformat expression */
504 	union {
505 		struct proxy *backend;		/* target backend */
506 		char *name;			/* target backend name during config parsing */
507 		struct list expr;		/* logformat expression to use for dynamic rules */
508 	} be;
509 	char *file;
510 	int line;
511 };
512 
513 struct server_rule {
514 	struct list list;			/* list linked to from the proxy */
515 	struct acl_cond *cond;			/* acl condition to meet */
516 	union {
517 		struct server *ptr;		/* target server */
518 		char *name;			/* target server name during config parsing */
519 	} srv;
520 };
521 
522 struct persist_rule {
523 	struct list list;			/* list linked to from the proxy */
524 	struct acl_cond *cond;			/* acl condition to meet */
525 	int type;
526 };
527 
528 struct sticking_rule {
529 	struct list list;                       /* list linked to from the proxy */
530 	struct acl_cond *cond;                  /* acl condition to meet */
531 	struct sample_expr *expr;               /* fetch expr to fetch key */
532 	int flags;                              /* STK_* */
533 	union {
534 		struct stktable *t;	        /* target table */
535 		char *name;                     /* target table name during config parsing */
536 	} table;
537 };
538 
539 
540 struct redirect_rule {
541 	struct list list;                       /* list linked to from the proxy */
542 	struct acl_cond *cond;                  /* acl condition to meet */
543 	int type;
544 	int rdr_len;
545 	char *rdr_str;
546 	struct list rdr_fmt;
547 	int code;
548 	unsigned int flags;
549 	int cookie_len;
550 	char *cookie_str;
551 };
552 
553 /* some of the most common options which are also the easiest to handle */
554 struct cfg_opt {
555 	const char *name;
556 	unsigned int val;
557 	unsigned int cap;
558 	unsigned int checks;
559 	unsigned int mode;
560 };
561 
562 #endif /* _TYPES_PROXY_H */
563 
564 /*
565  * Local variables:
566  *  c-indent-level: 8
567  *  c-basic-offset: 8
568  * End:
569  */
570