From b46aad6df449445a9fc4aa7b32bd40005438e3f7 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sat, 13 Apr 2024 14:18:05 +0200 Subject: Adding upstream version 2.9.5. Signed-off-by: Daniel Baumann --- src/frontend.c | 339 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 339 insertions(+) create mode 100644 src/frontend.c (limited to 'src/frontend.c') diff --git a/src/frontend.c b/src/frontend.c new file mode 100644 index 0000000..ad2e39e --- /dev/null +++ b/src/frontend.c @@ -0,0 +1,339 @@ +/* + * Frontend variables and functions. + * + * Copyright 2000-2013 Willy Tarreau + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version + * 2 of the License, or (at your option) any later version. + * + */ + +#include +#include +#include +#include + +#include +#include +#include + +#include + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + + +/* Finish a stream accept() for a proxy (TCP or HTTP). It returns a negative + * value in case of a critical failure which must cause the listener to be + * disabled, a positive or null value in case of success. + */ +int frontend_accept(struct stream *s) +{ + const struct sockaddr_storage *src, *dst; + struct session *sess = s->sess; + struct connection *conn = objt_conn(sess->origin); + struct listener *l = sess->listener; + struct proxy *fe = sess->fe; + + if ((fe->mode == PR_MODE_TCP || fe->mode == PR_MODE_HTTP) + && (!LIST_ISEMPTY(&fe->loggers))) { + if (likely(!LIST_ISEMPTY(&fe->logformat))) { + /* we have the client ip */ + if (s->logs.logwait & LW_CLIP) + if (!(s->logs.logwait &= ~(LW_CLIP|LW_INIT))) + s->do_log(s); + } + else if (conn) { + src = sc_src(s->scf); + if (!src) + send_log(fe, LOG_INFO, "Connect from unknown source to listener %d (%s/%s)\n", + l->luid, fe->id, (fe->mode == PR_MODE_HTTP) ? "HTTP" : "TCP"); + else { + char pn[INET6_ADDRSTRLEN], sn[INET6_ADDRSTRLEN]; + int port; + + switch (addr_to_str(src, pn, sizeof(pn))) { + case AF_INET: + case AF_INET6: + dst = sc_dst(s->scf); + if (dst) { + addr_to_str(dst, sn, sizeof(sn)); + port = get_host_port(dst); + } else { + strlcpy2(sn, "undetermined address", sizeof(sn)); + port = 0; + } + send_log(fe, LOG_INFO, "Connect from %s:%d to %s:%d (%s/%s)\n", + pn, get_host_port(src), + sn, port, + fe->id, (fe->mode == PR_MODE_HTTP) ? "HTTP" : "TCP"); + break; + case AF_UNIX: + /* UNIX socket, only the destination is known */ + send_log(fe, LOG_INFO, "Connect to unix:%d (%s/%s)\n", + l->luid, + fe->id, (fe->mode == PR_MODE_HTTP) ? "HTTP" : "TCP"); + break; + } + } + } + } + + if (unlikely((global.mode & MODE_DEBUG) && conn && + (!(global.mode & MODE_QUIET) || (global.mode & MODE_VERBOSE)))) { + char pn[INET6_ADDRSTRLEN]; + char alpn[16] = ""; + const char *alpn_str = NULL; + int alpn_len; + + /* try to report the ALPN value when available (also works for NPN) */ + if (conn == sc_conn(s->scf)) { + if (conn_get_alpn(conn, &alpn_str, &alpn_len) && alpn_str) { + int len = MIN(alpn_len, sizeof(alpn) - 1); + memcpy(alpn, alpn_str, len); + alpn[len] = 0; + } + } + + src = sc_src(s->scf); + if (!src) { + chunk_printf(&trash, "%08x:%s.accept(%04x)=%04x from [listener:%d] ALPN=%s\n", + s->uniq_id, fe->id, (unsigned short)l->rx.fd, (unsigned short)conn->handle.fd, + l->luid, alpn); + } + else switch (addr_to_str(src, pn, sizeof(pn))) { + case AF_INET: + case AF_INET6: + chunk_printf(&trash, "%08x:%s.accept(%04x)=%04x from [%s:%d] ALPN=%s\n", + s->uniq_id, fe->id, (unsigned short)l->rx.fd, (unsigned short)conn->handle.fd, + pn, get_host_port(src), alpn); + break; + case AF_UNIX: + /* UNIX socket, only the destination is known */ + chunk_printf(&trash, "%08x:%s.accept(%04x)=%04x from [unix:%d] ALPN=%s\n", + s->uniq_id, fe->id, (unsigned short)l->rx.fd, (unsigned short)conn->handle.fd, + l->luid, alpn); + break; + } + + DISGUISE(write(1, trash.area, trash.data)); + } + + if (fe->mode == PR_MODE_HTTP) + s->scf->flags |= SC_FL_RCV_ONCE; /* one read is usually enough */ + + if (unlikely(fe->nb_req_cap > 0)) { + if ((s->req_cap = pool_zalloc(fe->req_cap_pool)) == NULL) + goto out_return; /* no memory */ + } + + if (unlikely(fe->nb_rsp_cap > 0)) { + if ((s->res_cap = pool_zalloc(fe->rsp_cap_pool)) == NULL) + goto out_free_reqcap; /* no memory */ + } + + if ((fe->http_needed || IS_HTX_STRM(s)) && !http_create_txn(s)) + goto out_free_rspcap; + + /* everything's OK, let's go on */ + return 1; + + /* Error unrolling */ + out_free_rspcap: + pool_free(fe->rsp_cap_pool, s->res_cap); + out_free_reqcap: + pool_free(fe->req_cap_pool, s->req_cap); + out_return: + return -1; +} + +/* Increment current active connection counter. This ensures that global + * maxconn is not reached or exceeded. This must be done for every new frontend + * connection allocation. + * + * Returns the new actconn global value. If maxconn reached or exceeded, 0 is + * returned : the connection allocation should be cancelled. + */ +int increment_actconn() +{ + unsigned int count, next_actconn; + + do { + count = actconn; + if (unlikely(count >= global.maxconn)) { + /* maxconn reached */ + next_actconn = 0; + goto end; + } + + /* try to increment actconn */ + next_actconn = count + 1; + } while (!_HA_ATOMIC_CAS(&actconn, (int *)(&count), next_actconn) && __ha_cpu_relax()); + + end: + return next_actconn; +} + +/************************************************************************/ +/* All supported sample and ACL keywords must be declared here. */ +/************************************************************************/ + +/* set temp integer to the id of the frontend */ +static int +smp_fetch_fe_id(const struct arg *args, struct sample *smp, const char *kw, void *private) +{ + smp->flags = SMP_F_VOL_SESS; + smp->data.type = SMP_T_SINT; + smp->data.u.sint = smp->sess->fe->uuid; + return 1; +} + +/* set string to the name of the frontend */ +static int +smp_fetch_fe_name(const struct arg *args, struct sample *smp, const char *kw, void *private) +{ + smp->data.u.str.area = (char *)smp->sess->fe->id; + if (!smp->data.u.str.area) + return 0; + + smp->data.type = SMP_T_STR; + smp->flags = SMP_F_CONST; + smp->data.u.str.data = strlen(smp->data.u.str.area); + return 1; +} + +/* set string to the name of the default backend */ +static int +smp_fetch_fe_defbe(const struct arg *args, struct sample *smp, const char *kw, void *private) +{ + if (!smp->sess->fe->defbe.be) + return 0; + smp->data.u.str.area = (char *)smp->sess->fe->defbe.be->id; + if (!smp->data.u.str.area) + return 0; + + smp->data.type = SMP_T_STR; + smp->flags = SMP_F_CONST; + smp->data.u.str.data = strlen(smp->data.u.str.area); + return 1; +} + +/* set temp integer to the number of HTTP requests per second reaching the frontend. + * Accepts exactly 1 argument. Argument is a frontend, other types will cause + * an undefined behaviour. + */ +static int +smp_fetch_fe_req_rate(const struct arg *args, struct sample *smp, const char *kw, void *private) +{ + struct proxy *px = args->data.prx; + + if (px == NULL) + return 0; + if (px->cap & PR_CAP_DEF) + px = smp->px; + + smp->flags = SMP_F_VOL_TEST; + smp->data.type = SMP_T_SINT; + smp->data.u.sint = read_freq_ctr(&px->fe_req_per_sec); + return 1; +} + +/* set temp integer to the number of connections per second reaching the frontend. + * Accepts exactly 1 argument. Argument is a frontend, other types will cause + * an undefined behaviour. + */ +static int +smp_fetch_fe_sess_rate(const struct arg *args, struct sample *smp, const char *kw, void *private) +{ + struct proxy *px = args->data.prx; + + if (px == NULL) + return 0; + if (px->cap & PR_CAP_DEF) + px = smp->px; + + smp->flags = SMP_F_VOL_TEST; + smp->data.type = SMP_T_SINT; + smp->data.u.sint = read_freq_ctr(&px->fe_sess_per_sec); + return 1; +} + +/* set temp integer to the number of concurrent connections on the frontend + * Accepts exactly 1 argument. Argument is a frontend, other types will cause + * an undefined behaviour. + */ +static int +smp_fetch_fe_conn(const struct arg *args, struct sample *smp, const char *kw, void *private) +{ + struct proxy *px = args->data.prx; + + if (px == NULL) + return 0; + if (px->cap & PR_CAP_DEF) + px = smp->px; + + smp->flags = SMP_F_VOL_TEST; + smp->data.type = SMP_T_SINT; + smp->data.u.sint = px->feconn; + return 1; +} + +static int +smp_fetch_fe_client_timeout(const struct arg *args, struct sample *smp, const char *km, void *private) +{ + smp->flags = SMP_F_VOL_TXN; + smp->data.type = SMP_T_SINT; + smp->data.u.sint = TICKS_TO_MS(smp->sess->fe->timeout.client); + return 1; +} + + +/* Note: must not be declared as its list will be overwritten. + * Please take care of keeping this list alphabetically sorted. + */ +static struct sample_fetch_kw_list smp_kws = {ILH, { + { "fe_client_timeout", smp_fetch_fe_client_timeout, 0, NULL, SMP_T_SINT, SMP_USE_FTEND, }, + { "fe_conn", smp_fetch_fe_conn, ARG1(1,FE), NULL, SMP_T_SINT, SMP_USE_INTRN, }, + { "fe_defbe", smp_fetch_fe_defbe, 0, NULL, SMP_T_STR, SMP_USE_FTEND, }, + { "fe_id", smp_fetch_fe_id, 0, NULL, SMP_T_SINT, SMP_USE_FTEND, }, + { "fe_name", smp_fetch_fe_name, 0, NULL, SMP_T_STR, SMP_USE_FTEND, }, + { "fe_req_rate", smp_fetch_fe_req_rate, ARG1(1,FE), NULL, SMP_T_SINT, SMP_USE_INTRN, }, + { "fe_sess_rate", smp_fetch_fe_sess_rate, ARG1(1,FE), NULL, SMP_T_SINT, SMP_USE_INTRN, }, + { /* END */ }, +}}; + +INITCALL1(STG_REGISTER, sample_register_fetches, &smp_kws); + +/* Note: must not be declared as its list will be overwritten. + * Please take care of keeping this list alphabetically sorted. + */ +static struct acl_kw_list acl_kws = {ILH, { + { /* END */ }, +}}; + +INITCALL1(STG_REGISTER, acl_register_keywords, &acl_kws); + +/* + * Local variables: + * c-indent-level: 8 + * c-basic-offset: 8 + * End: + */ -- cgit v1.2.3