2007-10-29 00:09:36 +00:00
|
|
|
/*
|
2010-03-29 17:36:59 +00:00
|
|
|
* include/proto/proto_tcp.h
|
|
|
|
* This file contains TCP socket protocol definitions.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2000-2010 Willy Tarreau - w@1wt.eu
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation, version 2.1
|
|
|
|
* exclusively.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
*/
|
2007-10-29 00:09:36 +00:00
|
|
|
|
|
|
|
#ifndef _PROTO_PROTO_TCP_H
|
|
|
|
#define _PROTO_PROTO_TCP_H
|
|
|
|
|
|
|
|
#include <common/config.h>
|
[MAJOR] implement tcp request content inspection
Some people need to inspect contents of TCP requests before
deciding to forward a connection or not. A future extension
of this demand might consist in selecting a server farm
depending on the protocol detected in the request.
For this reason, a new state CL_STINSPECT has been added on
the client side. It is immediately entered upon accept() if
the statement "tcp-request inspect-delay <xxx>" is found in
the frontend configuration. Haproxy will then wait up to
this amount of time trying to find a matching ACL, and will
either accept or reject the connection depending on the
"tcp-request content <action> {if|unless}" rules, where
<action> is either "accept" or "reject".
Note that it only waits that long if no definitive verdict
can be found earlier. That generally implies calling a fetch()
function which does not have enough information to decode
some contents, or a match() function which only finds the
beginning of what it's looking for.
It is only at the ACL level that partial data may be processed
as such, because we need to distinguish between MISS and FAIL
*before* applying the term negation.
Thus it is enough to add "| ACL_PARTIAL" to the last argument
when calling acl_exec_cond() to indicate that we expect
ACL_PAT_MISS to be returned if some data is missing (for
fetch() or match()). This is the only case we may return
this value. For this reason, the ACL check in process_cli()
has become a lot simpler.
A new ACL "req_len" of type "int" has been added. Right now
it is already possible to drop requests which talk too early
(eg: for SMTP) or which don't talk at all (eg: HTTP/SSL).
Also, the acl fetch() functions have been extended in order
to permit reporting of missing data in case of fetch failure,
using the ACL_TEST_F_MAY_CHANGE flag.
The default behaviour is unchanged, and if no rule matches,
the request is accepted.
As a side effect, all layer 7 fetching functions have been
cleaned up so that they now check for the validity of the
layer 7 pointer before dereferencing it.
2008-07-14 21:54:42 +00:00
|
|
|
#include <types/proto_tcp.h>
|
2007-10-29 00:09:36 +00:00
|
|
|
#include <types/task.h>
|
2010-06-14 19:04:55 +00:00
|
|
|
#include <proto/stick_table.h>
|
2007-10-29 00:09:36 +00:00
|
|
|
|
2011-03-10 21:26:24 +00:00
|
|
|
int tcp_bind_socket(int fd, int flags, struct sockaddr_storage *local, struct sockaddr_storage *remote);
|
2007-10-29 00:09:36 +00:00
|
|
|
void tcpv4_add_listener(struct listener *listener);
|
|
|
|
void tcpv6_add_listener(struct listener *listener);
|
2011-03-10 21:26:24 +00:00
|
|
|
int tcp_connect_server(struct stream_interface *si);
|
2012-07-23 16:53:03 +00:00
|
|
|
int tcp_connect_probe(struct connection *conn);
|
2012-05-11 14:16:40 +00:00
|
|
|
int tcp_get_src(int fd, struct sockaddr *sa, socklen_t salen, int dir);
|
|
|
|
int tcp_get_dst(int fd, struct sockaddr *sa, socklen_t salen, int dir);
|
2009-07-07 08:55:49 +00:00
|
|
|
int tcp_inspect_request(struct session *s, struct buffer *req, int an_bit);
|
2010-09-23 15:56:44 +00:00
|
|
|
int tcp_inspect_response(struct session *s, struct buffer *rep, int an_bit);
|
2010-05-31 08:30:33 +00:00
|
|
|
int tcp_exec_req_rules(struct session *s);
|
2012-04-25 08:13:36 +00:00
|
|
|
int smp_fetch_rdp_cookie(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp);
|
2007-10-29 00:09:36 +00:00
|
|
|
|
2011-03-24 10:09:31 +00:00
|
|
|
/* Converts the TCP source address to a stick_table key usable for table
|
2010-06-14 19:04:55 +00:00
|
|
|
* lookups. Returns either NULL if the source cannot be converted (eg: not
|
|
|
|
* IPv4) or a pointer to the converted result in static_table_key in the
|
|
|
|
* appropriate format (IP).
|
|
|
|
*/
|
2011-03-24 10:09:31 +00:00
|
|
|
static inline struct stktable_key *tcp_src_to_stktable_key(struct session *s)
|
2010-06-14 19:04:55 +00:00
|
|
|
{
|
2011-09-23 08:54:59 +00:00
|
|
|
switch (s->si[0].addr.from.ss_family) {
|
2011-03-24 10:09:31 +00:00
|
|
|
case AF_INET:
|
2011-09-23 08:54:59 +00:00
|
|
|
static_table_key.key = (void *)&((struct sockaddr_in *)&s->si[0].addr.from)->sin_addr;
|
2011-04-07 08:44:39 +00:00
|
|
|
break;
|
2011-03-24 10:09:31 +00:00
|
|
|
case AF_INET6:
|
2011-09-23 08:54:59 +00:00
|
|
|
static_table_key.key = (void *)&((struct sockaddr_in6 *)&s->si[0].addr.from)->sin6_addr;
|
2011-04-07 08:44:39 +00:00
|
|
|
break;
|
2012-08-30 20:52:28 +00:00
|
|
|
default:
|
|
|
|
return NULL;
|
2011-03-24 10:09:31 +00:00
|
|
|
}
|
2010-06-14 19:04:55 +00:00
|
|
|
return &static_table_key;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-10-29 00:09:36 +00:00
|
|
|
#endif /* _PROTO_PROTO_TCP_H */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Local variables:
|
|
|
|
* c-indent-level: 8
|
|
|
|
* c-basic-offset: 8
|
|
|
|
* End:
|
|
|
|
*/
|