mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-10-29 07:31:00 +01:00
It is possible on at least Linux and FreeBSD to set the congestion control algorithm to be used with outgoing connections, among the list of supported and permitted ones. Let's expose this setting with "cc". Unknown or forbidden algorithms will be ignored and the default one will continue to be used.
384 lines
12 KiB
C
384 lines
12 KiB
C
/*
|
|
* Configuration parsing for TCP (bind and server keywords)
|
|
*
|
|
* Copyright 2000-2020 Willy Tarreau <w@1wt.eu>
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*
|
|
*/
|
|
|
|
#define _GNU_SOURCE // for TCP_MD5SIG_MAXKEYLEN
|
|
#include <ctype.h>
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/types.h>
|
|
|
|
#include <netinet/tcp.h>
|
|
#include <netinet/in.h>
|
|
|
|
#include <haproxy/api.h>
|
|
#include <haproxy/arg.h>
|
|
#include <haproxy/errors.h>
|
|
#include <haproxy/list.h>
|
|
#include <haproxy/listener.h>
|
|
#include <haproxy/namespace.h>
|
|
#include <haproxy/proxy-t.h>
|
|
#include <haproxy/server.h>
|
|
#include <haproxy/tools.h>
|
|
|
|
|
|
#ifdef IPV6_V6ONLY
|
|
/* parse the "v4v6" bind keyword */
|
|
static int bind_parse_v4v6(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
conf->settings.options |= RX_O_V4V6;
|
|
return 0;
|
|
}
|
|
|
|
/* parse the "v6only" bind keyword */
|
|
static int bind_parse_v6only(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
conf->settings.options |= RX_O_V6ONLY;
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef CONFIG_HAP_TRANSPARENT
|
|
/* parse the "transparent" bind keyword */
|
|
static int bind_parse_transparent(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
conf->settings.options |= RX_O_FOREIGN;
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#if defined(TCP_CONGESTION)
|
|
/* parse the "cc" bind keyword */
|
|
static int bind_parse_cc(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
if (!*args[cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing TCP congestion control algorithm", args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
ha_free(&conf->cc_algo);
|
|
conf->cc_algo = strdup(args[cur_arg + 1]);
|
|
if (!conf->cc_algo) {
|
|
memprintf(err, "'%s %s' : out of memory", args[cur_arg], args[cur_arg + 1]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#if defined(TCP_DEFER_ACCEPT) || defined(SO_ACCEPTFILTER)
|
|
/* parse the "defer-accept" bind keyword */
|
|
static int bind_parse_defer_accept(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
conf->options |= BC_O_DEF_ACCEPT;
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef TCP_FASTOPEN
|
|
/* parse the "tfo" bind keyword */
|
|
static int bind_parse_tfo(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
conf->options |= BC_O_TCP_FO;
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef TCP_MAXSEG
|
|
/* parse the "mss" bind keyword */
|
|
static int bind_parse_mss(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
int mss;
|
|
|
|
if (!*args[cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing MSS value", args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
mss = atoi(args[cur_arg + 1]);
|
|
if (!mss || abs(mss) > 65535) {
|
|
memprintf(err, "'%s' : expects an MSS with and absolute value between 1 and 65535", args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
conf->maxseg = mss;
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#if defined(__linux__) && defined(TCP_MD5SIG)
|
|
/* parse the "tcp-md5sig" bind keyword */
|
|
static int bind_parse_tcp_md5sig(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
if (!*args[cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing TCP MD5 signature password", args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
ha_free(&conf->tcp_md5sig);
|
|
if (strlen(args[cur_arg + 1]) > TCP_MD5SIG_MAXKEYLEN) {
|
|
memprintf(err, "'%s' : password too long (at most %d characters expected)",
|
|
args[cur_arg], TCP_MD5SIG_MAXKEYLEN);
|
|
return ERR_ALERT | ERR_ABORT;
|
|
}
|
|
conf->tcp_md5sig = strdup(args[cur_arg + 1]);
|
|
if (!conf->tcp_md5sig) {
|
|
memprintf(err, "'%s %s' : out of memory", args[cur_arg], args[cur_arg + 1]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef TCP_USER_TIMEOUT
|
|
/* parse the "tcp-ut" bind keyword */
|
|
static int bind_parse_tcp_ut(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
const char *ptr = NULL;
|
|
unsigned int timeout;
|
|
|
|
if (!*args[cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing TCP User Timeout value", args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
ptr = parse_time_err(args[cur_arg + 1], &timeout, TIME_UNIT_MS);
|
|
if (ptr == PARSE_TIME_OVER) {
|
|
memprintf(err, "timer overflow in argument '%s' to '%s' (maximum value is 2147483647 ms or ~24.8 days)",
|
|
args[cur_arg+1], args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
else if (ptr == PARSE_TIME_UNDER) {
|
|
memprintf(err, "timer underflow in argument '%s' to '%s' (minimum non-null value is 1 ms)",
|
|
args[cur_arg+1], args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
else if (ptr) {
|
|
memprintf(err, "'%s' : expects a positive delay in milliseconds", args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
conf->tcp_ut = timeout;
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef SO_BINDTODEVICE
|
|
/* parse the "interface" bind keyword */
|
|
static int bind_parse_interface(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
if (!*args[cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing interface name", args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
ha_free(&conf->settings.interface);
|
|
conf->settings.interface = strdup(args[cur_arg + 1]);
|
|
if (!conf->settings.interface) {
|
|
memprintf(err, "'%s %s' : out of memory", args[cur_arg], args[cur_arg + 1]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef USE_NS
|
|
/* parse the "namespace" bind keyword */
|
|
static int bind_parse_namespace(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
|
|
{
|
|
char *namespace = NULL;
|
|
|
|
if (!*args[cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing namespace id", args[cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
namespace = args[cur_arg + 1];
|
|
|
|
conf->settings.netns = netns_store_lookup(namespace, strlen(namespace));
|
|
|
|
if (conf->settings.netns == NULL)
|
|
conf->settings.netns = netns_store_insert(namespace);
|
|
|
|
if (conf->settings.netns == NULL) {
|
|
ha_alert("Cannot open namespace '%s'.\n", args[cur_arg + 1]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#if defined(TCP_CONGESTION)
|
|
/* parse the "cc" server keyword */
|
|
static int srv_parse_cc(char **args, int *cur_arg, struct proxy *px, struct server *newsrv, char **err)
|
|
{
|
|
if (!*args[*cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing TCP congestion control algorithm", args[*cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
ha_free(&newsrv->cc_algo);
|
|
newsrv->cc_algo = strdup(args[*cur_arg + 1]);
|
|
if (!newsrv->cc_algo) {
|
|
memprintf(err, "'%s %s' : out of memory", args[*cur_arg], args[*cur_arg + 1]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#if defined(__linux__) && defined(TCP_MD5SIG)
|
|
/* parse the "tcp-md5sig" server keyword */
|
|
static int srv_parse_tcp_md5sig(char **args, int *cur_arg, struct proxy *px, struct server *newsrv, char **err)
|
|
{
|
|
if (!*args[*cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing TCP MD5 signature password", args[*cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
if (newsrv->addr.ss_family == AF_INET || newsrv->addr.ss_family == AF_INET6) {
|
|
ha_free(&newsrv->tcp_md5sig);
|
|
if (strlen(args[*cur_arg + 1]) > TCP_MD5SIG_MAXKEYLEN) {
|
|
memprintf(err, "'%s' : password too long (at most %d characters expected)",
|
|
args[*cur_arg], TCP_MD5SIG_MAXKEYLEN);
|
|
return ERR_ALERT | ERR_ABORT;
|
|
}
|
|
newsrv->tcp_md5sig = strdup(args[*cur_arg + 1]);
|
|
if (!newsrv->tcp_md5sig) {
|
|
memprintf(err, "'%s %s' : out of memory", args[*cur_arg], args[*cur_arg + 1]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef TCP_USER_TIMEOUT
|
|
/* parse the "tcp-ut" server keyword */
|
|
static int srv_parse_tcp_ut(char **args, int *cur_arg, struct proxy *px, struct server *newsrv, char **err)
|
|
{
|
|
const char *ptr = NULL;
|
|
unsigned int timeout;
|
|
|
|
if (!*args[*cur_arg + 1]) {
|
|
memprintf(err, "'%s' : missing TCP User Timeout value", args[*cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
ptr = parse_time_err(args[*cur_arg + 1], &timeout, TIME_UNIT_MS);
|
|
if (ptr == PARSE_TIME_OVER) {
|
|
memprintf(err, "timer overflow in argument '%s' to '%s' (maximum value is 2147483647 ms or ~24.8 days)",
|
|
args[*cur_arg+1], args[*cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
else if (ptr == PARSE_TIME_UNDER) {
|
|
memprintf(err, "timer underflow in argument '%s' to '%s' (minimum non-null value is 1 ms)",
|
|
args[*cur_arg+1], args[*cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
else if (ptr) {
|
|
memprintf(err, "'%s' : expects a positive delay in milliseconds", args[*cur_arg]);
|
|
return ERR_ALERT | ERR_FATAL;
|
|
}
|
|
|
|
if (newsrv->addr.ss_family == AF_INET || newsrv->addr.ss_family == AF_INET6)
|
|
newsrv->tcp_ut = timeout;
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
|
|
/************************************************************************/
|
|
/* All supported bind keywords must be declared here. */
|
|
/************************************************************************/
|
|
|
|
/* Note: must not be declared <const> as its list will be overwritten.
|
|
* Please take care of keeping this list alphabetically sorted, doing so helps
|
|
* all code contributors.
|
|
* Optional keywords are also declared with a NULL ->parse() function so that
|
|
* the config parser can report an appropriate error when a known keyword was
|
|
* not enabled.
|
|
*/
|
|
static struct bind_kw_list bind_kws = { "TCP", { }, {
|
|
#if defined(TCP_CONGESTION)
|
|
{ "cc", bind_parse_cc, 1 }, /* set TCP congestion control algorithm */
|
|
#endif
|
|
#if defined(TCP_DEFER_ACCEPT) || defined(SO_ACCEPTFILTER)
|
|
{ "defer-accept", bind_parse_defer_accept, 0 }, /* wait for some data for 1 second max before doing accept */
|
|
#endif
|
|
#ifdef SO_BINDTODEVICE
|
|
{ "interface", bind_parse_interface, 1 }, /* specifically bind to this interface */
|
|
#endif
|
|
#ifdef TCP_MAXSEG
|
|
{ "mss", bind_parse_mss, 1 }, /* set MSS of listening socket */
|
|
#endif
|
|
#if defined(__linux__) && defined(TCP_MD5SIG)
|
|
{ "tcp-md5sig", bind_parse_tcp_md5sig, 1 }, /* set TCP MD5 signature password */
|
|
#endif
|
|
#ifdef TCP_USER_TIMEOUT
|
|
{ "tcp-ut", bind_parse_tcp_ut, 1 }, /* set User Timeout on listening socket */
|
|
#endif
|
|
#ifdef TCP_FASTOPEN
|
|
{ "tfo", bind_parse_tfo, 0 }, /* enable TCP_FASTOPEN of listening socket */
|
|
#endif
|
|
#ifdef CONFIG_HAP_TRANSPARENT
|
|
{ "transparent", bind_parse_transparent, 0 }, /* transparently bind to the specified addresses */
|
|
#endif
|
|
#ifdef IPV6_V6ONLY
|
|
{ "v4v6", bind_parse_v4v6, 0 }, /* force socket to bind to IPv4+IPv6 */
|
|
{ "v6only", bind_parse_v6only, 0 }, /* force socket to bind to IPv6 only */
|
|
#endif
|
|
#ifdef USE_NS
|
|
{ "namespace", bind_parse_namespace, 1 },
|
|
#endif
|
|
/* the versions with the NULL parse function*/
|
|
{ "defer-accept", NULL, 0 },
|
|
{ "interface", NULL, 1 },
|
|
{ "mss", NULL, 1 },
|
|
{ "transparent", NULL, 0 },
|
|
{ "v4v6", NULL, 0 },
|
|
{ "v6only", NULL, 0 },
|
|
{ NULL, NULL, 0 },
|
|
}};
|
|
|
|
INITCALL1(STG_REGISTER, bind_register_keywords, &bind_kws);
|
|
|
|
static struct srv_kw_list srv_kws = { "TCP", { }, {
|
|
#if defined(TCP_CONGESTION)
|
|
{ "cc", srv_parse_cc, 1, 1, 0 }, /* set TCP congestion control algorithm */
|
|
#endif
|
|
#if defined(__linux__) && defined(TCP_MD5SIG)
|
|
{ "tcp-md5sig", srv_parse_tcp_md5sig, 1, 1, 0 }, /* set TCP MD5 signature password on server */
|
|
#endif
|
|
#ifdef TCP_USER_TIMEOUT
|
|
{ "tcp-ut", srv_parse_tcp_ut, 1, 1, 0 }, /* set TCP user timeout on server */
|
|
#endif
|
|
{ NULL, NULL, 0 },
|
|
}};
|
|
|
|
INITCALL1(STG_REGISTER, srv_register_keywords, &srv_kws);
|
|
|
|
/*
|
|
* Local variables:
|
|
* c-indent-level: 8
|
|
* c-basic-offset: 8
|
|
* End:
|
|
*/
|