From b46aad6df449445a9fc4aa7b32bd40005438e3f7 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sat, 13 Apr 2024 14:18:05 +0200 Subject: Adding upstream version 2.9.5. Signed-off-by: Daniel Baumann --- src/cfgparse-global.c | 1396 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 1396 insertions(+) create mode 100644 src/cfgparse-global.c (limited to 'src/cfgparse-global.c') diff --git a/src/cfgparse-global.c b/src/cfgparse-global.c new file mode 100644 index 0000000..f31e7a0 --- /dev/null +++ b/src/cfgparse-global.c @@ -0,0 +1,1396 @@ +#define _GNU_SOURCE /* for cpu_set_t from haproxy/cpuset.h */ +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include + +#include +#include +#ifdef USE_CPU_AFFINITY +#include +#endif +#include +#include +#include +#include +#include +#include + +int cluster_secret_isset; + +/* some keywords that are still being parsed using strcmp() and are not + * registered anywhere. They are used as suggestions for mistyped words. + */ +static const char *common_kw_list[] = { + "global", "daemon", "master-worker", "noepoll", "nokqueue", + "noevports", "nopoll", "busy-polling", "set-dumpable", + "insecure-fork-wanted", "insecure-setuid-wanted", "nosplice", + "nogetaddrinfo", "noreuseport", "quiet", "zero-warning", + "tune.runqueue-depth", "tune.maxpollevents", "tune.maxaccept", + "tune.recv_enough", "tune.buffers.limit", + "tune.buffers.reserve", "tune.bufsize", "tune.maxrewrite", + "tune.idletimer", "tune.rcvbuf.client", "tune.rcvbuf.server", + "tune.sndbuf.client", "tune.sndbuf.server", "tune.pipesize", + "tune.http.cookielen", "tune.http.logurilen", "tune.http.maxhdr", + "tune.comp.maxlevel", "tune.pattern.cache-size", + "tune.fast-forward", "uid", "gid", + "external-check", "user", "group", "nbproc", "maxconn", + "ssl-server-verify", "maxconnrate", "maxsessrate", "maxsslrate", + "maxcomprate", "maxpipes", "maxzlibmem", "maxcompcpuusage", "ulimit-n", + "chroot", "description", "node", "pidfile", "unix-bind", "log", + "log-send-hostname", "server-state-base", "server-state-file", + "log-tag", "spread-checks", "max-spread-checks", "cpu-map", "setenv", + "presetenv", "unsetenv", "resetenv", "strict-limits", "localpeer", + "numa-cpu-mapping", "defaults", "listen", "frontend", "backend", + "peers", "resolvers", "cluster-secret", "no-quic", "limited-quic", + NULL /* must be last */ +}; + +/* + * parse a line in a section. Returns the error code, 0 if OK, or + * any combination of : + * - ERR_ABORT: must abort ASAP + * - ERR_FATAL: we can continue parsing but not start the service + * - ERR_WARN: a warning has been emitted + * - ERR_ALERT: an alert has been emitted + * Only the two first ones can stop processing, the two others are just + * indicators. + */ +int cfg_parse_global(const char *file, int linenum, char **args, int kwm) +{ + int err_code = 0; + char *errmsg = NULL; + + if (strcmp(args[0], "global") == 0) { /* new section */ + /* no option, nothing special to do */ + alertif_too_many_args(0, file, linenum, args, &err_code); + goto out; + } + else if (strcmp(args[0], "expose-experimental-directives") == 0) { + experimental_directives_allowed = 1; + } + else if (strcmp(args[0], "daemon") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.mode |= MODE_DAEMON; + } + else if (strcmp(args[0], "master-worker") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*args[1]) { + if (strcmp(args[1], "no-exit-on-failure") == 0) { + global.tune.options |= GTUNE_NOEXIT_ONFAILURE; + } else { + ha_alert("parsing [%s:%d] : '%s' only supports 'no-exit-on-failure' option.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + global.mode |= MODE_MWORKER; + } + else if (strcmp(args[0], "noepoll") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.options &= ~GTUNE_USE_EPOLL; + } + else if (strcmp(args[0], "nokqueue") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.options &= ~GTUNE_USE_KQUEUE; + } + else if (strcmp(args[0], "noevports") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.options &= ~GTUNE_USE_EVPORTS; + } + else if (strcmp(args[0], "nopoll") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.options &= ~GTUNE_USE_POLL; + } + else if (strcmp(args[0], "limited-quic") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + + global.tune.options |= GTUNE_LIMITED_QUIC; + } + else if (strcmp(args[0], "no-quic") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + + global.tune.options |= GTUNE_NO_QUIC; + } + else if (strcmp(args[0], "busy-polling") == 0) { /* "no busy-polling" or "busy-polling" */ + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + if (kwm == KWM_NO) + global.tune.options &= ~GTUNE_BUSY_POLLING; + else + global.tune.options |= GTUNE_BUSY_POLLING; + } + else if (strcmp(args[0], "set-dumpable") == 0) { /* "no set-dumpable" or "set-dumpable" */ + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + if (kwm == KWM_NO) + global.tune.options &= ~GTUNE_SET_DUMPABLE; + else + global.tune.options |= GTUNE_SET_DUMPABLE; + } + else if (strcmp(args[0], "h2-workaround-bogus-websocket-clients") == 0) { /* "no h2-workaround-bogus-websocket-clients" or "h2-workaround-bogus-websocket-clients" */ + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + if (kwm == KWM_NO) + global.tune.options &= ~GTUNE_DISABLE_H2_WEBSOCKET; + else + global.tune.options |= GTUNE_DISABLE_H2_WEBSOCKET; + } + else if (strcmp(args[0], "insecure-fork-wanted") == 0) { /* "no insecure-fork-wanted" or "insecure-fork-wanted" */ + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + if (kwm == KWM_NO) + global.tune.options &= ~GTUNE_INSECURE_FORK; + else + global.tune.options |= GTUNE_INSECURE_FORK; + } + else if (strcmp(args[0], "insecure-setuid-wanted") == 0) { /* "no insecure-setuid-wanted" or "insecure-setuid-wanted" */ + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + if (kwm == KWM_NO) + global.tune.options &= ~GTUNE_INSECURE_SETUID; + else + global.tune.options |= GTUNE_INSECURE_SETUID; + } + else if (strcmp(args[0], "nosplice") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.options &= ~GTUNE_USE_SPLICE; + } + else if (strcmp(args[0], "nogetaddrinfo") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.options &= ~GTUNE_USE_GAI; + } + else if (strcmp(args[0], "noreuseport") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + protocol_clrf_all(PROTO_F_REUSEPORT_SUPPORTED); + } + else if (strcmp(args[0], "quiet") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.mode |= MODE_QUIET; + } + else if (strcmp(args[0], "zero-warning") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.mode |= MODE_ZERO_WARNING; + } + else if (strcmp(args[0], "tune.runqueue-depth") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.tune.runqueue_depth != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.runqueue_depth = atol(args[1]); + + } + else if (strcmp(args[0], "tune.maxpollevents") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.tune.maxpollevents != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.maxpollevents = atol(args[1]); + } + else if (strcmp(args[0], "tune.maxaccept") == 0) { + long max; + + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.tune.maxaccept != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + max = atol(args[1]); + if (/*max < -1 || */max > INT_MAX) { + ha_alert("parsing [%s:%d] : '%s' expects -1 or an integer from 0 to INT_MAX.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.maxaccept = max; + } + else if (strcmp(args[0], "tune.chksize") == 0) { + ha_alert("parsing [%s:%d]: option '%s' is not supported any more (tune.bufsize is used instead).\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + else if (strcmp(args[0], "tune.recv_enough") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.recv_enough = atol(args[1]); + } + else if (strcmp(args[0], "tune.buffers.limit") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.buf_limit = atol(args[1]); + if (global.tune.buf_limit) { + if (global.tune.buf_limit < 3) + global.tune.buf_limit = 3; + if (global.tune.buf_limit <= global.tune.reserved_bufs) + global.tune.buf_limit = global.tune.reserved_bufs + 1; + } + } + else if (strcmp(args[0], "tune.buffers.reserve") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.reserved_bufs = atol(args[1]); + if (global.tune.reserved_bufs < 2) + global.tune.reserved_bufs = 2; + if (global.tune.buf_limit && global.tune.buf_limit <= global.tune.reserved_bufs) + global.tune.buf_limit = global.tune.reserved_bufs + 1; + } + else if (strcmp(args[0], "tune.bufsize") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.bufsize = atol(args[1]); + /* round it up to support a two-pointer alignment at the end */ + global.tune.bufsize = (global.tune.bufsize + 2 * sizeof(void *) - 1) & -(2 * sizeof(void *)); + if (global.tune.bufsize <= 0) { + ha_alert("parsing [%s:%d] : '%s' expects a positive integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "tune.maxrewrite") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.maxrewrite = atol(args[1]); + if (global.tune.maxrewrite < 0) { + ha_alert("parsing [%s:%d] : '%s' expects a positive integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "tune.idletimer") == 0) { + unsigned int idle; + const char *res; + + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects a timer value between 0 and 65535 ms.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + res = parse_time_err(args[1], &idle, TIME_UNIT_MS); + if (res == PARSE_TIME_OVER) { + ha_alert("parsing [%s:%d]: timer overflow in argument <%s> to <%s>, maximum value is 65535 ms.\n", + file, linenum, args[1], args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + else if (res == PARSE_TIME_UNDER) { + ha_alert("parsing [%s:%d]: timer underflow in argument <%s> to <%s>, minimum non-null value is 1 ms.\n", + file, linenum, args[1], args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + else if (res) { + ha_alert("parsing [%s:%d]: unexpected character '%c' in argument to <%s>.\n", + file, linenum, *res, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + if (idle > 65535) { + ha_alert("parsing [%s:%d] : '%s' expects a timer value between 0 and 65535 ms.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.idle_timer = idle; + } + else if (strcmp(args[0], "tune.rcvbuf.client") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.tune.client_rcvbuf != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.client_rcvbuf = atol(args[1]); + } + else if (strcmp(args[0], "tune.rcvbuf.server") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.tune.server_rcvbuf != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.server_rcvbuf = atol(args[1]); + } + else if (strcmp(args[0], "tune.sndbuf.client") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.tune.client_sndbuf != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.client_sndbuf = atol(args[1]); + } + else if (strcmp(args[0], "tune.sndbuf.server") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.tune.server_sndbuf != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.server_sndbuf = atol(args[1]); + } + else if (strcmp(args[0], "tune.pipesize") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.pipesize = atol(args[1]); + } + else if (strcmp(args[0], "tune.http.cookielen") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.cookie_len = atol(args[1]) + 1; + } + else if (strcmp(args[0], "tune.http.logurilen") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.requri_len = atol(args[1]) + 1; + } + else if (strcmp(args[0], "tune.http.maxhdr") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.tune.max_http_hdr = atoi(args[1]); + if (global.tune.max_http_hdr < 1 || global.tune.max_http_hdr > 32767) { + ha_alert("parsing [%s:%d] : '%s' expects a numeric value between 1 and 32767\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "tune.comp.maxlevel") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*args[1]) { + global.tune.comp_maxlevel = atoi(args[1]); + if (global.tune.comp_maxlevel < 1 || global.tune.comp_maxlevel > 9) { + ha_alert("parsing [%s:%d] : '%s' expects a numeric value between 1 and 9\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } else { + ha_alert("parsing [%s:%d] : '%s' expects a numeric value between 1 and 9\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "tune.pattern.cache-size") == 0) { + if (*args[1]) { + global.tune.pattern_cache = atoi(args[1]); + if (global.tune.pattern_cache < 0) { + ha_alert("parsing [%s:%d] : '%s' expects a positive numeric value\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } else { + ha_alert("parsing [%s:%d] : '%s' expects a positive numeric value\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "tune.disable-fast-forward") == 0) { + if (!experimental_directives_allowed) { + ha_alert("parsing [%s:%d] : '%s' directive is experimental, must be allowed via a global 'expose-experimental-directives'", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + mark_tainted(TAINTED_CONFIG_EXP_KW_DECLARED); + + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.options &= ~GTUNE_USE_FAST_FWD; + } + else if (strcmp(args[0], "tune.disable-zero-copy-forwarding") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.no_zero_copy_fwd |= NO_ZERO_COPY_FWD; + } + else if (strcmp(args[0], "cluster-secret") == 0) { + blk_SHA_CTX sha1_ctx; + unsigned char sha1_out[20]; + + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*args[1] == 0) { + ha_alert("parsing [%s:%d] : expects an ASCII string argument.\n", file, linenum); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + if (cluster_secret_isset) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + + blk_SHA1_Init(&sha1_ctx); + blk_SHA1_Update(&sha1_ctx, args[1], strlen(args[1])); + blk_SHA1_Final(sha1_out, &sha1_ctx); + BUG_ON(sizeof sha1_out < sizeof global.cluster_secret); + memcpy(global.cluster_secret, sha1_out, sizeof global.cluster_secret); + cluster_secret_isset = 1; + } + else if (strcmp(args[0], "uid") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.uid != 0) { + ha_alert("parsing [%s:%d] : user/uid already specified. Continuing.\n", file, linenum); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + if (strl2irc(args[1], strlen(args[1]), &global.uid) != 0) { + ha_warning("parsing [%s:%d] : uid: string '%s' is not a number.\n | You might want to use the 'user' parameter to use a system user name.\n", file, linenum, args[1]); + err_code |= ERR_WARN; + goto out; + } + + } + else if (strcmp(args[0], "gid") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.gid != 0) { + ha_alert("parsing [%s:%d] : group/gid already specified. Continuing.\n", file, linenum); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + if (strl2irc(args[1], strlen(args[1]), &global.gid) != 0) { + ha_warning("parsing [%s:%d] : gid: string '%s' is not a number.\n | You might want to use the 'group' parameter to use a system group name.\n", file, linenum, args[1]); + err_code |= ERR_WARN; + goto out; + } + } + else if (strcmp(args[0], "external-check") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + global.external_check = 1; + if (strcmp(args[1], "preserve-env") == 0) { + global.external_check = 2; + } else if (*args[1]) { + ha_alert("parsing [%s:%d] : '%s' only supports 'preserve-env' as an argument, found '%s'.\n", file, linenum, args[0], args[1]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + /* user/group name handling */ + else if (strcmp(args[0], "user") == 0) { + struct passwd *ha_user; + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.uid != 0) { + ha_alert("parsing [%s:%d] : user/uid already specified. Continuing.\n", file, linenum); + err_code |= ERR_ALERT; + goto out; + } + errno = 0; + ha_user = getpwnam(args[1]); + if (ha_user != NULL) { + global.uid = (int)ha_user->pw_uid; + } + else { + ha_alert("parsing [%s:%d] : cannot find user id for '%s' (%d:%s)\n", file, linenum, args[1], errno, strerror(errno)); + err_code |= ERR_ALERT | ERR_FATAL; + } + } + else if (strcmp(args[0], "group") == 0) { + struct group *ha_group; + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.gid != 0) { + ha_alert("parsing [%s:%d] : gid/group was already specified. Continuing.\n", file, linenum); + err_code |= ERR_ALERT; + goto out; + } + errno = 0; + ha_group = getgrnam(args[1]); + if (ha_group != NULL) { + global.gid = (int)ha_group->gr_gid; + } + else { + ha_alert("parsing [%s:%d] : cannot find group id for '%s' (%d:%s)\n", file, linenum, args[1], errno, strerror(errno)); + err_code |= ERR_ALERT | ERR_FATAL; + } + } + /* end of user/group name handling*/ + else if (strcmp(args[0], "nbproc") == 0) { + ha_alert("parsing [%s:%d] : nbproc is not supported any more since HAProxy 2.5. Threads will automatically be used on multi-processor machines if available.\n", file, linenum); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + else if (strcmp(args[0], "maxconn") == 0) { + char *stop; + + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.maxconn != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.maxconn = strtol(args[1], &stop, 10); + if (*stop != '\0') { + ha_alert("parsing [%s:%d] : cannot parse '%s' value '%s', an integer is expected.\n", file, linenum, args[0], args[1]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } +#ifdef SYSTEM_MAXCONN + if (global.maxconn > SYSTEM_MAXCONN && cfg_maxconn <= SYSTEM_MAXCONN) { + ha_alert("parsing [%s:%d] : maxconn value %d too high for this system.\nLimiting to %d. Please use '-n' to force the value.\n", file, linenum, global.maxconn, SYSTEM_MAXCONN); + global.maxconn = SYSTEM_MAXCONN; + err_code |= ERR_ALERT; + } +#endif /* SYSTEM_MAXCONN */ + } + else if (strcmp(args[0], "ssl-server-verify") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + if (strcmp(args[1],"none") == 0) + global.ssl_server_verify = SSL_SERVER_VERIFY_NONE; + else if (strcmp(args[1],"required") == 0) + global.ssl_server_verify = SSL_SERVER_VERIFY_REQUIRED; + else { + ha_alert("parsing [%s:%d] : '%s' expects 'none' or 'required' as argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "maxconnrate") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.cps_lim != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.cps_lim = atol(args[1]); + } + else if (strcmp(args[0], "maxsessrate") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.sps_lim != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.sps_lim = atol(args[1]); + } + else if (strcmp(args[0], "maxsslrate") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.ssl_lim != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.ssl_lim = atol(args[1]); + } + else if (strcmp(args[0], "maxcomprate") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument in kb/s.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.comp_rate_lim = atoi(args[1]) * 1024; + } + else if (strcmp(args[0], "maxpipes") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.maxpipes != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.maxpipes = atol(args[1]); + } + else if (strcmp(args[0], "maxzlibmem") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.maxzlibmem = atol(args[1]) * 1024L * 1024L; + } + else if (strcmp(args[0], "maxcompcpuusage") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument between 0 and 100.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + compress_min_idle = 100 - atoi(args[1]); + if (compress_min_idle > 100) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument between 0 and 100.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "fd-hard-limit") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.fd_hard_limit != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.fd_hard_limit = atol(args[1]); + } + else if (strcmp(args[0], "ulimit-n") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.rlimit_nofile != 0) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects an integer argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.rlimit_nofile = atol(args[1]); + } + else if (strcmp(args[0], "chroot") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.chroot != NULL) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects a directory as an argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.chroot = strdup(args[1]); + } + else if (strcmp(args[0], "description") == 0) { + int i, len=0; + char *d; + + if (!*args[1]) { + ha_alert("parsing [%s:%d]: '%s' expects a string argument.\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + for (i = 1; *args[i]; i++) + len += strlen(args[i]) + 1; + + if (global.desc) + free(global.desc); + + global.desc = d = calloc(1, len); + + d += snprintf(d, global.desc + len - d, "%s", args[1]); + for (i = 2; *args[i]; i++) + d += snprintf(d, global.desc + len - d, " %s", args[i]); + } + else if (strcmp(args[0], "node") == 0) { + int i; + char c; + + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + + for (i=0; args[1][i]; i++) { + c = args[1][i]; + if (!isupper((unsigned char)c) && !islower((unsigned char)c) && + !isdigit((unsigned char)c) && c != '_' && c != '-' && c != '.') + break; + } + + if (!i || args[1][i]) { + ha_alert("parsing [%s:%d]: '%s' requires valid node name - non-empty string" + " with digits(0-9), letters(A-Z, a-z), dot(.), hyphen(-) or underscode(_).\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + if (global.node) + free(global.node); + + global.node = strdup(args[1]); + } + else if (strcmp(args[0], "pidfile") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.pidfile != NULL) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects a file name as an argument.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.pidfile = strdup(args[1]); + } + else if (strcmp(args[0], "unix-bind") == 0) { + int cur_arg = 1; + while (*(args[cur_arg])) { + if (strcmp(args[cur_arg], "prefix") == 0) { + if (global.unix_bind.prefix != NULL) { + ha_alert("parsing [%s:%d] : unix-bind '%s' already specified. Continuing.\n", file, linenum, args[cur_arg]); + err_code |= ERR_ALERT; + cur_arg += 2; + continue; + } + + if (*(args[cur_arg+1]) == 0) { + ha_alert("parsing [%s:%d] : unix_bind '%s' expects a path as an argument.\n", file, linenum, args[cur_arg]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.unix_bind.prefix = strdup(args[cur_arg+1]); + cur_arg += 2; + continue; + } + + if (strcmp(args[cur_arg], "mode") == 0) { + + global.unix_bind.ux.mode = strtol(args[cur_arg + 1], NULL, 8); + cur_arg += 2; + continue; + } + + if (strcmp(args[cur_arg], "uid") == 0) { + + global.unix_bind.ux.uid = atol(args[cur_arg + 1 ]); + cur_arg += 2; + continue; + } + + if (strcmp(args[cur_arg], "gid") == 0) { + + global.unix_bind.ux.gid = atol(args[cur_arg + 1 ]); + cur_arg += 2; + continue; + } + + if (strcmp(args[cur_arg], "user") == 0) { + struct passwd *user; + + user = getpwnam(args[cur_arg + 1]); + if (!user) { + ha_alert("parsing [%s:%d] : '%s' : '%s' unknown user.\n", + file, linenum, args[0], args[cur_arg + 1 ]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + global.unix_bind.ux.uid = user->pw_uid; + cur_arg += 2; + continue; + } + + if (strcmp(args[cur_arg], "group") == 0) { + struct group *group; + + group = getgrnam(args[cur_arg + 1]); + if (!group) { + ha_alert("parsing [%s:%d] : '%s' : '%s' unknown group.\n", + file, linenum, args[0], args[cur_arg + 1 ]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + global.unix_bind.ux.gid = group->gr_gid; + cur_arg += 2; + continue; + } + + ha_alert("parsing [%s:%d] : '%s' only supports the 'prefix', 'mode', 'uid', 'gid', 'user' and 'group' options.\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "log") == 0) { /* "no log" or "log ..." */ + if (!parse_logger(args, &global.loggers, (kwm == KWM_NO), file, linenum, &errmsg)) { + ha_alert("parsing [%s:%d] : %s : %s\n", file, linenum, args[0], errmsg); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "log-send-hostname") == 0) { /* set the hostname in syslog header */ + char *name; + + if (global.log_send_hostname != NULL) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + + if (*(args[1])) + name = args[1]; + else + name = hostname; + + free(global.log_send_hostname); + global.log_send_hostname = strdup(name); + } + else if (strcmp(args[0], "server-state-base") == 0) { /* path base where HAProxy can find server state files */ + if (global.server_state_base != NULL) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + + if (!*(args[1])) { + ha_alert("parsing [%s:%d] : '%s' expects one argument: a directory path.\n", file, linenum, args[0]); + err_code |= ERR_FATAL; + goto out; + } + + global.server_state_base = strdup(args[1]); + } + else if (strcmp(args[0], "server-state-file") == 0) { /* path to the file where HAProxy can load the server states */ + if (global.server_state_file != NULL) { + ha_alert("parsing [%s:%d] : '%s' already specified. Continuing.\n", file, linenum, args[0]); + err_code |= ERR_ALERT; + goto out; + } + + if (!*(args[1])) { + ha_alert("parsing [%s:%d] : '%s' expect one argument: a file path.\n", file, linenum, args[0]); + err_code |= ERR_FATAL; + goto out; + } + + global.server_state_file = strdup(args[1]); + } + else if (strcmp(args[0], "log-tag") == 0) { /* tag to report to syslog */ + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects a tag for use in syslog.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + chunk_destroy(&global.log_tag); + chunk_initlen(&global.log_tag, strdup(args[1]), strlen(args[1]), strlen(args[1])); + if (b_orig(&global.log_tag) == NULL) { + chunk_destroy(&global.log_tag); + ha_alert("parsing [%s:%d]: cannot allocate memory for '%s'.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "spread-checks") == 0) { /* random time between checks (0-50) */ + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (global.spread_checks != 0) { + ha_alert("parsing [%s:%d]: spread-checks already specified. Continuing.\n", file, linenum); + err_code |= ERR_ALERT; + goto out; + } + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d]: '%s' expects an integer argument (0..50).\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + global.spread_checks = atol(args[1]); + if (global.spread_checks < 0 || global.spread_checks > 50) { + ha_alert("parsing [%s:%d]: 'spread-checks' needs a positive value in range 0..50.\n", file, linenum); + err_code |= ERR_ALERT | ERR_FATAL; + } + } + else if (strcmp(args[0], "max-spread-checks") == 0) { /* maximum time between first and last check */ + const char *err; + unsigned int val; + + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d]: '%s' expects an integer argument (0..50).\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + err = parse_time_err(args[1], &val, TIME_UNIT_MS); + if (err == PARSE_TIME_OVER) { + ha_alert("parsing [%s:%d]: timer overflow in argument <%s> to <%s>, maximum value is 2147483647 ms (~24.8 days).\n", + file, linenum, args[1], args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + } + else if (err == PARSE_TIME_UNDER) { + ha_alert("parsing [%s:%d]: timer underflow in argument <%s> to <%s>, minimum non-null value is 1 ms.\n", + file, linenum, args[1], args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + } + else if (err) { + ha_alert("parsing [%s:%d]: unsupported character '%c' in '%s' (wants an integer delay).\n", file, linenum, *err, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + } + global.max_spread_checks = val; + } + else if (strcmp(args[0], "cpu-map") == 0) { + /* map a process list to a CPU set */ +#ifdef USE_CPU_AFFINITY + char *slash; + unsigned long tgroup = 0, thread = 0; + int g, j, n, autoinc; + struct hap_cpuset cpus, cpus_copy; + + if (!*args[1] || !*args[2]) { + ha_alert("parsing [%s:%d] : %s expects a thread group number " + " ('all', 'odd', 'even', a number from 1 to %d or a range), " + " followed by a list of CPU ranges with numbers from 0 to %d.\n", + file, linenum, args[0], LONGBITS, LONGBITS - 1); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + if ((slash = strchr(args[1], '/')) != NULL) + *slash = 0; + + /* note: we silently ignore thread group numbers over MAX_TGROUPS + * and threads over MAX_THREADS so as not to make configurations a + * pain to maintain. + */ + if (parse_process_number(args[1], &tgroup, LONGBITS, &autoinc, &errmsg)) { + ha_alert("parsing [%s:%d] : %s : %s\n", file, linenum, args[0], errmsg); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + if (slash) { + if (parse_process_number(slash+1, &thread, LONGBITS, NULL, &errmsg)) { + ha_alert("parsing [%s:%d] : %s : %s\n", file, linenum, args[0], errmsg); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + *slash = '/'; + } else + thread = ~0UL; /* missing '/' = 'all' */ + + /* from now on, thread cannot be NULL anymore */ + + if (parse_cpu_set((const char **)args+2, &cpus, &errmsg)) { + ha_alert("parsing [%s:%d] : %s : %s\n", file, linenum, args[0], errmsg); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + if (autoinc && + my_popcountl(tgroup) != ha_cpuset_count(&cpus) && + my_popcountl(thread) != ha_cpuset_count(&cpus)) { + ha_alert("parsing [%s:%d] : %s : TGROUP/THREAD range and CPU sets " + "must have the same size to be automatically bound\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + /* we now have to deal with 3 real cases : + * cpu-map P-Q => mapping for whole tgroups, numbers P to Q + * cpu-map P-Q/1 => mapping of first thread of groups P to Q + * cpu-map P/T-U => mapping of threads T to U of tgroup P + */ + /* first tgroup, iterate on threads. E.g. cpu-map 1/1-4 0-3 */ + for (g = 0; g < MAX_TGROUPS; g++) { + /* No mapping for this tgroup */ + if (!(tgroup & (1UL << g))) + continue; + + ha_cpuset_assign(&cpus_copy, &cpus); + + /* a thread set is specified, apply the + * CPU set to these threads. + */ + for (j = n = 0; j < MAX_THREADS_PER_GROUP; j++) { + /* No mapping for this thread */ + if (!(thread & (1UL << j))) + continue; + + if (!autoinc) + ha_cpuset_assign(&cpu_map[g].thread[j], &cpus); + else { + ha_cpuset_zero(&cpu_map[g].thread[j]); + n = ha_cpuset_ffs(&cpus_copy) - 1; + ha_cpuset_clr(&cpus_copy, n); + ha_cpuset_set(&cpu_map[g].thread[j], n); + } + } + } +#else + ha_alert("parsing [%s:%d] : '%s' is not enabled, please check build options for USE_CPU_AFFINITY.\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; +#endif /* ! USE_CPU_AFFINITY */ + } + else if (strcmp(args[0], "setenv") == 0 || strcmp(args[0], "presetenv") == 0) { + if (alertif_too_many_args(3, file, linenum, args, &err_code)) + goto out; + + if (*(args[2]) == 0) { + ha_alert("parsing [%s:%d]: '%s' expects a name and a value.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + /* "setenv" overwrites, "presetenv" only sets if not yet set */ + if (setenv(args[1], args[2], (args[0][0] == 's')) != 0) { + ha_alert("parsing [%s:%d]: '%s' failed on variable '%s' : %s.\n", file, linenum, args[0], args[1], strerror(errno)); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else if (strcmp(args[0], "unsetenv") == 0) { + int arg; + + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d]: '%s' expects at least one variable name.\n", file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + for (arg = 1; *args[arg]; arg++) { + if (unsetenv(args[arg]) != 0) { + ha_alert("parsing [%s:%d]: '%s' failed on variable '%s' : %s.\n", file, linenum, args[0], args[arg], strerror(errno)); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + } + else if (strcmp(args[0], "resetenv") == 0) { + extern char **environ; + char **env = environ; + + /* args contain variable names to keep, one per argument */ + while (*env) { + int arg; + + /* look for current variable in among all those we want to keep */ + for (arg = 1; *args[arg]; arg++) { + if (strncmp(*env, args[arg], strlen(args[arg])) == 0 && + (*env)[strlen(args[arg])] == '=') + break; + } + + /* delete this variable */ + if (!*args[arg]) { + char *delim = strchr(*env, '='); + + if (!delim || delim - *env >= trash.size) { + ha_alert("parsing [%s:%d]: '%s' failed to unset invalid variable '%s'.\n", file, linenum, args[0], *env); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + memcpy(trash.area, *env, delim - *env); + trash.area[delim - *env] = 0; + + if (unsetenv(trash.area) != 0) { + ha_alert("parsing [%s:%d]: '%s' failed to unset variable '%s' : %s.\n", file, linenum, args[0], *env, strerror(errno)); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + } + else + env++; + } + } + else if (strcmp(args[0], "quick-exit") == 0) { + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + global.tune.options |= GTUNE_QUICK_EXIT; + } + else if (strcmp(args[0], "strict-limits") == 0) { /* "no strict-limits" or "strict-limits" */ + if (alertif_too_many_args(0, file, linenum, args, &err_code)) + goto out; + if (kwm == KWM_NO) + global.tune.options &= ~GTUNE_STRICT_LIMITS; + } + else if (strcmp(args[0], "localpeer") == 0) { + if (alertif_too_many_args(1, file, linenum, args, &err_code)) + goto out; + + if (*(args[1]) == 0) { + ha_alert("parsing [%s:%d] : '%s' expects a name as an argument.\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + if (global.localpeer_cmdline != 0) { + ha_warning("parsing [%s:%d] : '%s' ignored since it is already set by using the '-L' " + "command line argument.\n", file, linenum, args[0]); + err_code |= ERR_WARN; + goto out; + } + + if (cfg_peers) { + ha_warning("parsing [%s:%d] : '%s' ignored since it is used after 'peers' section.\n", + file, linenum, args[0]); + err_code |= ERR_WARN; + goto out; + } + + free(localpeer); + if ((localpeer = strdup(args[1])) == NULL) { + ha_alert("parsing [%s:%d]: cannot allocate memory for '%s'.\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + setenv("HAPROXY_LOCALPEER", localpeer, 1); + } + else if (strcmp(args[0], "numa-cpu-mapping") == 0) { + global.numa_cpu_mapping = (kwm == KWM_NO) ? 0 : 1; + } + else if (strcmp(args[0], "anonkey") == 0) { + long long tmp = 0; + + if (*args[1] == 0) { + ha_alert("parsing [%s:%d]: a key is expected after '%s'.\n", + file, linenum, args[0]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + if (HA_ATOMIC_LOAD(&global.anon_key) == 0) { + tmp = atoll(args[1]); + if (tmp < 0 || tmp > UINT_MAX) { + ha_alert("parsing [%s:%d]: '%s' value must be within range %u-%u (was '%s').\n", + file, linenum, args[0], 0, UINT_MAX, args[1]); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + HA_ATOMIC_STORE(&global.anon_key, tmp); + } + } + else { + struct cfg_kw_list *kwl; + const char *best; + int index; + int rc; + + list_for_each_entry(kwl, &cfg_keywords.list, list) { + for (index = 0; kwl->kw[index].kw != NULL; index++) { + if (kwl->kw[index].section != CFG_GLOBAL) + continue; + if (strcmp(kwl->kw[index].kw, args[0]) == 0) { + if (check_kw_experimental(&kwl->kw[index], file, linenum, &errmsg)) { + ha_alert("%s\n", errmsg); + err_code |= ERR_ALERT | ERR_FATAL; + goto out; + } + + rc = kwl->kw[index].parse(args, CFG_GLOBAL, NULL, NULL, file, linenum, &errmsg); + if (rc < 0) { + ha_alert("parsing [%s:%d] : %s\n", file, linenum, errmsg); + err_code |= ERR_ALERT | ERR_FATAL; + } + else if (rc > 0) { + ha_warning("parsing [%s:%d] : %s\n", file, linenum, errmsg); + err_code |= ERR_WARN; + goto out; + } + goto out; + } + } + } + + best = cfg_find_best_match(args[0], &cfg_keywords.list, CFG_GLOBAL, common_kw_list); + if (best) + ha_alert("parsing [%s:%d] : unknown keyword '%s' in '%s' section; did you mean '%s' maybe ?\n", file, linenum, args[0], cursection, best); + else + ha_alert("parsing [%s:%d] : unknown keyword '%s' in '%s' section\n", file, linenum, args[0], "global"); + err_code |= ERR_ALERT | ERR_FATAL; + } + + out: + free(errmsg); + return err_code; +} + +static int cfg_parse_prealloc_fd(char **args, int section_type, struct proxy *curpx, + const struct proxy *defpx, const char *file, int line, + char **err) +{ + if (too_many_args(0, args, err, NULL)) + return -1; + + global.prealloc_fd = 1; + + return 0; +} + +static struct cfg_kw_list cfg_kws = {ILH, { + { CFG_GLOBAL, "prealloc-fd", cfg_parse_prealloc_fd }, + { 0, NULL, NULL }, +}}; + +INITCALL1(STG_REGISTER, cfg_register_keywords, &cfg_kws); -- cgit v1.2.3