/* * include/proto/session.h * This file defines everything related to sessions. * * Copyright (C) 2000-2010 Willy Tarreau - w@1wt.eu * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation, version 2.1 * exclusively. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ #ifndef _PROTO_SESSION_H #define _PROTO_SESSION_H #include #include #include #include #include extern struct pool_head *pool2_session; extern struct list sessions; extern struct data_cb sess_conn_cb; int session_accept(struct listener *l, int cfd, struct sockaddr_storage *addr); /* perform minimal intializations, report 0 in case of error, 1 if OK. */ int init_session(); /* kill a session and set the termination flags to (one of SN_ERR_*) */ void session_shutdown(struct session *session, int why); void session_process_counters(struct session *s); void sess_change_server(struct session *sess, struct server *newsrv); struct task *process_session(struct task *t); void default_srv_error(struct session *s, struct stream_interface *si); int parse_track_counters(char **args, int *arg, int section_type, struct proxy *curpx, struct track_ctr_prm *prm, struct proxy *defpx, char **err); /* Remove the refcount from the session to the tracked counters, and clear the * pointer to ensure this is only performed once. The caller is responsible for * ensuring that the pointer is valid first. */ static inline void session_store_counters(struct session *s) { void *ptr; if (s->stkctr2_entry) { ptr = stktable_data_ptr(s->stkctr2_table, s->stkctr2_entry, STKTABLE_DT_CONN_CUR); if (ptr) stktable_data_cast(ptr, conn_cur)--; s->stkctr2_entry->ref_cnt--; stksess_kill_if_expired(s->stkctr2_table, s->stkctr2_entry); s->stkctr2_entry = NULL; } if (s->stkctr1_entry) { ptr = stktable_data_ptr(s->stkctr1_table, s->stkctr1_entry, STKTABLE_DT_CONN_CUR); if (ptr) stktable_data_cast(ptr, conn_cur)--; s->stkctr1_entry->ref_cnt--; stksess_kill_if_expired(s->stkctr1_table, s->stkctr1_entry); s->stkctr1_entry = NULL; } } /* Remove the refcount from the session counters tracked only by the backend if * any, and clear the pointer to ensure this is only performed once. The caller * is responsible for ensuring that the pointer is valid first. */ static inline void session_stop_backend_counters(struct session *s) { void *ptr; if (!(s->flags & (SN_BE_TRACK_SC1|SN_BE_TRACK_SC2))) return; if ((s->flags & SN_BE_TRACK_SC1) && s->stkctr1_entry) { ptr = stktable_data_ptr(s->stkctr1_table, s->stkctr1_entry, STKTABLE_DT_CONN_CUR); if (ptr) stktable_data_cast(ptr, conn_cur)--; s->stkctr1_entry->ref_cnt--; stksess_kill_if_expired(s->stkctr1_table, s->stkctr1_entry); s->stkctr1_entry = NULL; } if ((s->flags & SN_BE_TRACK_SC2) && s->stkctr2_entry) { ptr = stktable_data_ptr(s->stkctr2_table, s->stkctr2_entry, STKTABLE_DT_CONN_CUR); if (ptr) stktable_data_cast(ptr, conn_cur)--; s->stkctr2_entry->ref_cnt--; stksess_kill_if_expired(s->stkctr2_table, s->stkctr2_entry); s->stkctr2_entry = NULL; } s->flags &= ~(SN_BE_TRACK_SC1|SN_BE_TRACK_SC2); } /* Increase total and concurrent connection count for stick entry of table * . The caller is responsible for ensuring that and are valid * pointers, and for calling this only once per connection. */ static inline void session_start_counters(struct stktable *t, struct stksess *ts) { void *ptr; ptr = stktable_data_ptr(t, ts, STKTABLE_DT_CONN_CUR); if (ptr) stktable_data_cast(ptr, conn_cur)++; ptr = stktable_data_ptr(t, ts, STKTABLE_DT_CONN_CNT); if (ptr) stktable_data_cast(ptr, conn_cnt)++; ptr = stktable_data_ptr(t, ts, STKTABLE_DT_CONN_RATE); if (ptr) update_freq_ctr_period(&stktable_data_cast(ptr, conn_rate), t->data_arg[STKTABLE_DT_CONN_RATE].u, 1); if (tick_isset(t->expire)) ts->expire = tick_add(now_ms, MS_TO_TICKS(t->expire)); } /* Enable tracking of session counters as stkctr1 on stksess . The caller is * responsible for ensuring that and are valid pointers. Some controls * are performed to ensure the state can still change. */ static inline void session_track_stkctr1(struct session *s, struct stktable *t, struct stksess *ts) { if (s->stkctr1_entry) return; ts->ref_cnt++; s->stkctr1_table = t; s->stkctr1_entry = ts; session_start_counters(t, ts); } /* Enable tracking of session counters as stkctr1 on stksess . The caller is * responsible for ensuring that and are valid pointers. Some controls * are performed to ensure the state can still change. */ static inline void session_track_stkctr2(struct session *s, struct stktable *t, struct stksess *ts) { if (s->stkctr2_entry) return; ts->ref_cnt++; s->stkctr2_table = t; s->stkctr2_entry = ts; session_start_counters(t, ts); } /* Increase the number of cumulated HTTP requests in the tracked counters */ static void inline session_inc_http_req_ctr(struct session *s) { void *ptr; if (s->stkctr2_entry) { ptr = stktable_data_ptr(s->stkctr2_table, s->stkctr2_entry, STKTABLE_DT_HTTP_REQ_CNT); if (ptr) stktable_data_cast(ptr, http_req_cnt)++; ptr = stktable_data_ptr(s->stkctr2_table, s->stkctr2_entry, STKTABLE_DT_HTTP_REQ_RATE); if (ptr) update_freq_ctr_period(&stktable_data_cast(ptr, http_req_rate), s->stkctr2_table->data_arg[STKTABLE_DT_HTTP_REQ_RATE].u, 1); } if (s->stkctr1_entry) { ptr = stktable_data_ptr(s->stkctr1_table, s->stkctr1_entry, STKTABLE_DT_HTTP_REQ_CNT); if (ptr) stktable_data_cast(ptr, http_req_cnt)++; ptr = stktable_data_ptr(s->stkctr1_table, s->stkctr1_entry, STKTABLE_DT_HTTP_REQ_RATE); if (ptr) update_freq_ctr_period(&stktable_data_cast(ptr, http_req_rate), s->stkctr1_table->data_arg[STKTABLE_DT_HTTP_REQ_RATE].u, 1); } } /* Increase the number of cumulated failed HTTP requests in the tracked * counters. Only 4xx requests should be counted here so that we can * distinguish between errors caused by client behaviour and other ones. * Note that even 404 are interesting because they're generally caused by * vulnerability scans. */ static void inline session_inc_http_err_ctr(struct session *s) { void *ptr; if (s->stkctr2_entry) { ptr = stktable_data_ptr(s->stkctr2_table, s->stkctr2_entry, STKTABLE_DT_HTTP_ERR_CNT); if (ptr) stktable_data_cast(ptr, http_err_cnt)++; ptr = stktable_data_ptr(s->stkctr2_table, s->stkctr2_entry, STKTABLE_DT_HTTP_ERR_RATE); if (ptr) update_freq_ctr_period(&stktable_data_cast(ptr, http_err_rate), s->stkctr2_table->data_arg[STKTABLE_DT_HTTP_ERR_RATE].u, 1); } if (s->stkctr1_entry) { ptr = stktable_data_ptr(s->stkctr1_table, s->stkctr1_entry, STKTABLE_DT_HTTP_ERR_CNT); if (ptr) stktable_data_cast(ptr, http_err_cnt)++; ptr = stktable_data_ptr(s->stkctr1_table, s->stkctr1_entry, STKTABLE_DT_HTTP_ERR_RATE); if (ptr) update_freq_ctr_period(&stktable_data_cast(ptr, http_err_rate), s->stkctr1_table->data_arg[STKTABLE_DT_HTTP_ERR_RATE].u, 1); } } static void inline session_add_srv_conn(struct session *sess, struct server *srv) { sess->srv_conn = srv; LIST_ADD(&srv->actconns, &sess->by_srv); } static void inline session_del_srv_conn(struct session *sess) { if (!sess->srv_conn) return; sess->srv_conn = NULL; LIST_DEL(&sess->by_srv); } static void inline session_init_srv_conn(struct session *sess) { sess->srv_conn = NULL; LIST_INIT(&sess->by_srv); } #endif /* _PROTO_SESSION_H */ /* * Local variables: * c-indent-level: 8 * c-basic-offset: 8 * End: */