varnish-cache/bin/varnishtest/vtest2/src/vtc_haproxy.c
0
/*-
1
 * Copyright (c) 2008-2018 Varnish Software AS
2
 * All rights reserved.
3
 *
4
 * Author: Frédéric Lécaille <flecaille@haproxy.com>
5
 *
6
 * SPDX-License-Identifier: BSD-2-Clause
7
 *
8
 * Redistribution and use in source and binary forms, with or without
9
 * modification, are permitted provided that the following conditions
10
 * are met:
11
 * 1. Redistributions of source code must retain the above copyright
12
 *    notice, this list of conditions and the following disclaimer.
13
 * 2. Redistributions in binary form must reproduce the above copyright
14
 *    notice, this list of conditions and the following disclaimer in the
15
 *    documentation and/or other materials provided with the distribution.
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20
 * ARE DISCLAIMED.  IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE
21
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27
 * SUCH DAMAGE.
28
 */
29
30
#include "config.h"
31
32
#include <inttypes.h>
33
#include <poll.h>
34
#include <stdio.h>
35
#include <stdlib.h>
36
#include <string.h>
37
#include <sys/stat.h> /* for MUSL (mode_t) */
38
#include <sys/types.h>
39
#include <sys/socket.h>
40
#include <sys/un.h>
41
#include <unistd.h>
42
43
#include "vtc.h"
44
45
#include "vfil.h"
46
#include "vpf.h"
47
#include "vre.h"
48
#include "vtcp.h"
49
#include "vsa.h"
50
#include "vtim.h"
51
52
#define HAPROXY_PROGRAM_ENV_VAR "HAPROXY_PROGRAM"
53
#define HAPROXY_ARGS_ENV_VAR    "HAPROXY_ARGS"
54
#define HAPROXY_OPT_WORKER      "-W"
55
#define HAPROXY_OPT_SD_WORKER   "-Ws"
56
#define HAPROXY_OPT_MCLI        "-S"
57
#define HAPROXY_OPT_DAEMON      "-D"
58
#define HAPROXY_SIGNAL          SIGINT
59
#define HAPROXY_EXPECT_EXIT     (128 + HAPROXY_SIGNAL)
60
61
struct envar {
62
        VTAILQ_ENTRY(envar) list;
63
        char *name;
64
        char *value;
65
};
66
67
struct haproxy {
68
        unsigned                magic;
69
#define HAPROXY_MAGIC           0x8a45cf75
70
        char                    *name;
71
        struct vtclog           *vl;
72
        VTAILQ_ENTRY(haproxy)   list;
73
74
        const char              *filename;
75
        struct vsb              *args;
76
        int                     opt_worker;
77
        int                     opt_mcli;
78
        int                     opt_daemon;
79
        int                     opt_check_mode;
80
        char                    *pid_fn;
81
        pid_t                   pid;
82
        pid_t                   ppid;
83
        int                     fds[4];
84
        char                    *cfg_fn;
85
        struct vsb              *cfg_vsb;
86
87
        pthread_t               tp;
88
        int                     expect_exit;
89
        int                     expect_signal;
90
        int                     its_dead_jim;
91
92
        /* sd_notify unix socket */
93
        struct sockaddr_un      sd_uds;
94
        int                     sd_sock;
95
96
        /* UNIX socket CLI. */
97
        char                    *cli_fn;
98
        /* TCP socket CLI. */
99
        struct haproxy_cli *cli;
100
101
        /* master CLI */
102
        struct haproxy_cli *mcli;
103
104
        char                    *workdir;
105
        struct vsb              *msgs;
106
        char                    closed_sock[256]; /* Closed TCP socket */
107
        VTAILQ_HEAD(,envar) envars;
108
};
109
110
static VTAILQ_HEAD(, haproxy)   haproxies =
111
    VTAILQ_HEAD_INITIALIZER(haproxies);
112
113
struct haproxy_cli {
114
        unsigned                magic;
115
#define HAPROXY_CLI_MAGIC       0xb09a4ed8
116
        struct vtclog           *vl;
117
        char                    running;
118
119
        char                    *spec;
120
121
        int                     sock;
122
        char                    connect[256];
123
124
        pthread_t               tp;
125
        size_t                  txbuf_sz;
126
        char                    *txbuf;
127
        size_t                  rxbuf_sz;
128
        char                    *rxbuf;
129
130
        vtim_dur                timeout;
131
};
132
133
static void haproxy_write_conf(struct haproxy *h);
134
135
static void
136
haproxy_add_envar(struct haproxy *h,
137 19
                  const char *name, const char *value)
138
{
139
        struct envar *e;
140
141
        e = malloc(sizeof *e);
142 19
        AN(e);
143 19
        e->name = strdup(name);
144 19
        e->value = strdup(value);
145 19
        AN(e->name);
146 19
        AN(e->value);
147 19
        VTAILQ_INSERT_TAIL(&h->envars, e, list);
148 19
}
149 19
150
static void
151
haproxy_delete_envars(struct haproxy *h)
152 11
{
153
        struct envar *e, *e2;
154
        VTAILQ_FOREACH_SAFE(e, &h->envars, list, e2) {
155 30
                VTAILQ_REMOVE(&h->envars, e, list);
156 19
                free(e->name);
157 19
                free(e->value);
158 19
                free(e);
159 19
        }
160 19
}
161 11
162
static void
163
haproxy_build_env(const struct haproxy *h)
164 11
{
165
        struct envar *e;
166
167
        VTAILQ_FOREACH(e, &h->envars, list) {
168 30
                if (setenv(e->name, e->value, 0) == -1)
169 19
                        vtc_fatal(h->vl, "setenv() failed: %s (%d)",
170 0
                                  strerror(errno), errno);
171 0
        }
172 19
}
173 11
174
/**********************************************************************
175
 * Socket connect (same as client_tcp_connect()).
176
 */
177
178
static int
179
haproxy_cli_tcp_connect(struct vtclog *vl, const char *addr, vtim_dur tmo,
180 2
    const char **errp)
181
{
182
        int fd;
183
        char mabuf[VTCP_ADDRBUFSIZE], mpbuf[VTCP_PORTBUFSIZE];
184
185
        AN(addr);
186 2
        AN(errp);
187 2
        fd = VTCP_open(addr, NULL, tmo, errp);
188 2
        if (fd < 0)
189 2
                return (fd);
190 0
        VTCP_myname(fd, mabuf, sizeof mabuf, mpbuf, sizeof mpbuf);
191 2
        vtc_log(vl, 3,
192 4
            "CLI connected fd %d from %s %s to %s", fd, mabuf, mpbuf, addr);
193 2
        return (fd);
194 2
}
195 2
196
/*
197
 * SECTION: haproxy.cli haproxy CLI Specification
198
 * SECTION: haproxy.cli.send
199
 * send STRING
200
 *         Push STRING on the CLI connection. STRING will be terminated by an
201
 *         end of line character (\n).
202
 */
203
static void v_matchproto_(cmd_f)
204
cmd_haproxy_cli_send(CMD_ARGS)
205 2
{
206
        struct vsb *vsb;
207
        struct haproxy_cli *hc;
208
        int j;
209
210
        (void)vl;
211 2
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
212 2
        AZ(strcmp(av[0], "send"));
213 2
        AN(av[1]);
214 2
        AZ(av[2]);
215 2
216
        vsb = VSB_new_auto();
217 2
        AN(vsb);
218 2
        AZ(VSB_cat(vsb, av[1]));
219 2
        AZ(VSB_cat(vsb, "\n"));
220 2
        AZ(VSB_finish(vsb));
221 2
        if (hc->sock == -1) {
222 2
                int fd;
223
                const char *err;
224
                struct vsb *vsb_connect;
225
226
                vsb_connect = macro_expand(hc->vl, hc->connect);
227 0
                AN(vsb_connect);
228 0
                fd = haproxy_cli_tcp_connect(hc->vl,
229 0
                    VSB_data(vsb_connect), 10., &err);
230 0
                if (fd < 0)
231 0
                        vtc_fatal(hc->vl,
232 0
                            "CLI failed to open %s: %s", VSB_data(vsb), err);
233 0
                VSB_destroy(&vsb_connect);
234 0
                hc->sock = fd;
235 0
        }
236 0
        vtc_dump(hc->vl, 4, "CLI send", VSB_data(vsb), -1);
237 2
238
        if (VSB_tofile(vsb, hc->sock))
239 2
                vtc_fatal(hc->vl,
240 0
                    "CLI fd %d send error %s", hc->sock, strerror(errno));
241 0
242
        /* a CLI command must be followed by a SHUT_WR if we want HAProxy to
243
         * close after the response */
244
        j = shutdown(hc->sock, SHUT_WR);
245 2
        vtc_log(hc->vl, 3, "CLI shutting fd %d", hc->sock);
246 2
        if (!VTCP_Check(j))
247 2
                vtc_fatal(hc->vl, "Shutdown failed: %s", strerror(errno));
248 0
249
        VSB_destroy(&vsb);
250 2
}
251 2
252
#define HAPROXY_CLI_RECV_LEN (1 << 14)
253
static void
254
haproxy_cli_recv(struct haproxy_cli *hc)
255 2
{
256
        ssize_t ret;
257
        size_t rdz, left, off;
258
259
        rdz = ret = off = 0;
260 2
        /* We want to null terminate this buffer. */
261
        left = hc->rxbuf_sz - 1;
262 2
        while (!vtc_error && left > 0) {
263 4
                VTCP_set_read_timeout(hc->sock, hc->timeout);
264 4
265
                ret = recv(hc->sock, hc->rxbuf + off, HAPROXY_CLI_RECV_LEN, 0);
266 4
                if (ret < 0) {
267 4
                        if (errno == EINTR || errno == EAGAIN)
268 0
                                continue;
269 0
270
                        vtc_fatal(hc->vl,
271 0
                            "CLI fd %d recv() failed (%s)",
272
                            hc->sock, strerror(errno));
273 0
                }
274
                /* Connection closed. */
275
                if (ret == 0) {
276 4
                        if (rdz > 0 && hc->rxbuf[rdz - 1] != '\n')
277 2
                                vtc_fatal(hc->vl,
278 0
                                    "CLI rx timeout (fd: %d %.3fs ret: %zd)",
279
                                    hc->sock, hc->timeout, ret);
280 0
281
                        vtc_log(hc->vl, 4, "CLI connection normally closed");
282 2
                        vtc_log(hc->vl, 3, "CLI closing fd %d", hc->sock);
283 2
                        VTCP_close(&hc->sock);
284 2
                        break;
285 2
                }
286
287
                rdz += ret;
288 2
                left -= ret;
289 2
                off  += ret;
290 2
        }
291
        hc->rxbuf[rdz] = '\0';
292 2
        vtc_dump(hc->vl, 4, "CLI recv", hc->rxbuf, rdz);
293 2
}
294 2
295
/*
296
 * SECTION: haproxy.cli.expect
297
 * expect OP STRING
298
 *         Regex match the CLI reception buffer with STRING
299
 *         if OP is ~ or, on the contrary, if OP is !~ check that there is
300
 *         no regex match.
301
 */
302
static void v_matchproto_(cmd_f)
303
cmd_haproxy_cli_expect(CMD_ARGS)
304 2
{
305
        struct haproxy_cli *hc;
306
        struct vsb vsb[1];
307
        vre_t *vre;
308
        int error, erroroffset, i, ret;
309
        char *cmp, *spec, errbuf[VRE_ERROR_LEN];
310
311
        (void)vl;
312 2
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
313 2
        AZ(strcmp(av[0], "expect"));
314 2
        av++;
315 2
316
        cmp = av[0];
317 2
        spec = av[1];
318 2
        AN(cmp);
319 2
        AN(spec);
320 2
        AZ(av[2]);
321 2
322
        assert(!strcmp(cmp, "~") || !strcmp(cmp, "!~"));
323 2
324
        haproxy_cli_recv(hc);
325 2
326
        vre = VRE_compile(spec, 0, &error, &erroroffset, 1);
327 2
        if (vre == NULL) {
328 2
                AN(VSB_init(vsb, errbuf, sizeof errbuf));
329 0
                AZ(VRE_error(vsb, error));
330 0
                AZ(VSB_finish(vsb));
331 0
                VSB_fini(vsb);
332 0
                vtc_fatal(hc->vl, "CLI regexp error: '%s' (@%d) (%s)",
333 0
                    errbuf, erroroffset, spec);
334 0
        }
335
336
        i = VRE_match(vre, hc->rxbuf, 0, 0, NULL);
337 2
338
        VRE_free(&vre);
339 2
340
        ret = (i >= 0 && *cmp == '~') || (i < 0 && *cmp == '!');
341 2
        if (!ret)
342 2
                vtc_fatal(hc->vl, "CLI expect failed %s \"%s\"", cmp, spec);
343 0
        else
344
                vtc_log(hc->vl, 4, "CLI expect match %s \"%s\"", cmp, spec);
345 2
}
346 2
347
static const struct cmds haproxy_cli_cmds[] = {
348
#define CMD_HAPROXY_CLI(n) { #n, cmd_haproxy_cli_##n },
349
        CMD_HAPROXY_CLI(send)
350
        CMD_HAPROXY_CLI(expect)
351
#undef CMD_HAPROXY_CLI
352
        { NULL, NULL }
353
};
354
355
/**********************************************************************
356
 * HAProxy CLI client thread
357
 */
358
359
static void *
360
haproxy_cli_thread(void *priv)
361 2
{
362
        struct haproxy_cli *hc;
363
        struct vsb *vsb;
364
        int fd;
365
        const char *err;
366
367
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
368 2
        AN(*hc->connect);
369 2
370
        vsb = macro_expand(hc->vl, hc->connect);
371 2
        AN(vsb);
372 2
373
        fd = haproxy_cli_tcp_connect(hc->vl, VSB_data(vsb), 10., &err);
374 2
        if (fd < 0)
375 2
                vtc_fatal(hc->vl,
376 0
                    "CLI failed to open %s: %s", VSB_data(vsb), err);
377 0
        VTCP_blocking(fd);
378 2
        hc->sock = fd;
379 2
        parse_string(hc->vl, hc, hc->spec);
380 2
        vtc_log(hc->vl, 2, "CLI ending");
381 2
        VSB_destroy(&vsb);
382 2
        return (NULL);
383 2
}
384
385
/**********************************************************************
386
 * Wait for the CLI client thread to stop
387
 */
388
389
static void
390
haproxy_cli_wait(struct haproxy_cli *hc)
391 2
{
392
        void *res;
393
394
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
395 2
        vtc_log(hc->vl, 2, "CLI waiting");
396 2
        PTOK(pthread_join(hc->tp, &res));
397 2
        if (res != NULL)
398 2
                vtc_fatal(hc->vl, "CLI returned \"%s\"", (char *)res);
399 0
        REPLACE(hc->spec, NULL);
400 2
        hc->tp = 0;
401 2
        hc->running = 0;
402 2
}
403 2
404
/**********************************************************************
405
 * Start the CLI client thread
406
 */
407
408
static void
409
haproxy_cli_start(struct haproxy_cli *hc)
410 2
{
411
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
412 2
        vtc_log(hc->vl, 2, "CLI starting");
413 2
        PTOK(pthread_create(&hc->tp, NULL, haproxy_cli_thread, hc));
414 2
        hc->running = 1;
415 2
416
}
417 2
418
/**********************************************************************
419
 * Run the CLI client thread
420
 */
421
422
static void
423
haproxy_cli_run(struct haproxy_cli *hc)
424 2
{
425
        haproxy_cli_start(hc);
426 2
        haproxy_cli_wait(hc);
427 2
}
428 2
429
/**********************************************************************
430
 * Wait for the pidfile
431
 */
432
433
static void
434
haproxy_wait_pidfile(struct haproxy *h)
435 4
{
436
        char buf_err[1024] = {0};
437 4
        int usleep_time = 1000;
438 4
        double t0;
439
        pid_t pid;
440
441
        vtc_log(h->vl, 3, "wait-pid-file");
442 4
        for (t0 = VTIM_mono(); VTIM_mono() - t0 < 3;) {
443 140
                if (vtc_error)
444 140
                        return;
445 0
446
                if (VPF_Read(h->pid_fn, &pid) != 0) {
447 140
                        bprintf(buf_err,
448 136
                            "Could not read PID file '%s'", h->pid_fn);
449
                        usleep(usleep_time);
450 136
                        continue;
451 136
                }
452
453
                if (!h->opt_daemon && pid != h->pid) {
454 4
                        bprintf(buf_err,
455 0
                            "PID file has different PID (%ld != %lld)",
456
                            (long)pid, (long long)h->pid);
457
                        usleep(usleep_time);
458 0
                        continue;
459 0
                }
460
461
                if (kill(pid, 0) < 0) {
462 4
                        bprintf(buf_err,
463 0
                            "Could not find PID %ld process", (long)pid);
464
                        usleep(usleep_time);
465 0
                        continue;
466 0
                }
467
468
                h->pid = pid;
469 4
470
                vtc_log(h->vl, 2, "haproxy PID %ld successfully started",
471 8
                    (long)pid);
472 4
                return;
473 4
        }
474
        vtc_fatal(h->vl, "haproxy %s PID file check failed:\n\t%s\n",
475 0
                  h->name, buf_err);
476 0
}
477 4
478
/**********************************************************************
479
 * Bind the sd_notify socket
480
 */
481
static void
482
haproxy_bind_sdnotify(struct haproxy *h)
483 1
{
484
        char sd_path[PATH_MAX];
485
        int sd;
486
        int ret;
487
        const char *err = NULL;
488 1
        struct sockaddr_un *uds = &h->sd_uds;
489 1
        socklen_t sl = sizeof(*uds);
490 1
491
        bprintf(sd_path, "%s/sd_notify.sock", h->workdir);
492 1
        assert(sd_path[0] == '/');
493 1
494
        if (strlen(sd_path) + 1 > sizeof(uds->sun_path)) {
495 1
                vtc_fatal(h->vl, "Path %s too long for a Unix domain socket", sd_path);
496 0
        }
497
        memset(uds->sun_path, 0, sizeof(uds->sun_path));
498 1
        bprintf(uds->sun_path, "%s", sd_path);
499 1
        uds->sun_family = PF_UNIX;
500 1
501
        sd = socket(AF_UNIX, SOCK_DGRAM, 0);
502 1
        if (sd < 0) {
503 1
                err = "socket(2)";
504 0
                goto error;
505 0
        }
506
507
        if (unlink(uds->sun_path) != 0 && errno != ENOENT) {
508 1
                err = "unlink(2)";
509 0
                closefd(&sd);
510 0
                goto error;
511 0
        }
512
513
        if (bind(sd, (const void*)uds, sl) != 0) {
514 1
                err = "bind(2)";
515 0
                closefd(&sd);
516 0
                goto error;
517 0
        }
518
519
        h->sd_sock = sd;
520 1
521
        assert(h->sd_sock > 0);
522 1
        vtc_log(h->vl, 4, "sd_notify %s", sd_path);
523 1
        ret = setenv("NOTIFY_SOCKET", sd_path, 1);
524 1
        assert(ret == 0);
525 1
526
error:
527
        if (err != NULL)
528 1
                vtc_fatal(h->vl, "Create sd_notify socket failed: %s", err);
529 0
}
530 1
531
/**********************************************************************
532
 * Wait for the "READY" from sd_notify
533
 */
534
static void
535
haproxy_wait_sdnotify_ready(struct haproxy *h)
536 1
{
537
        struct pollfd fd[1];
538
        char buf[BUFSIZ];
539
        int i, r;
540
        char *ready = NULL;
541 1
542
        vtc_log(h->vl, 3, "wait-sdnotify-ready");
543 1
544
        /* First try to do an accept on h->sd_sock */
545
        memset(fd, 0, sizeof(fd));
546 1
        fd[0].fd = h->sd_sock;
547 1
        fd[0].events = POLLIN;
548 1
549
        i = poll(fd, 1, vtc_maxdur * 1000 / 3);
550 1
        vtc_log(h->vl, 4, "sd_notify recv poll %d 0x%x ", i, fd[0].revents);
551 1
        if (i == 0)
552 1
                vtc_fatal(h->vl, "FAIL timeout waiting for sd_notify recv");
553 0
        if (!(fd[0].revents & POLLIN))
554 1
                vtc_fatal(h->vl, "FAIL sd_notify recv wait failure");
555 0
556
        r = recv(h->sd_sock, buf, sizeof(buf) - 1, 0);
557 1
        if (r > 0) {
558 1
                buf[r] = '\0';
559 1
                ready = strstr(buf, "READY=1");
560 1
        }
561 1
562
        if (!ready)
563 1
                vtc_fatal(h->vl, "FAIL sd_notify recv READY failure");
564 0
        else
565
                vtc_log(h->vl, 3, "sd_notify READY=1");
566 1
}
567 1
/**********************************************************************
568
 * Allocate and initialize a CLI client
569
 */
570
571
static struct haproxy_cli *
572
haproxy_cli_new(struct haproxy *h)
573 11
{
574
        struct haproxy_cli *hc;
575
576
        ALLOC_OBJ(hc, HAPROXY_CLI_MAGIC);
577 11
        AN(hc);
578 11
579
        hc->vl = h->vl;
580 11
        vtc_log_set_cmd(hc->vl, haproxy_cli_cmds);
581 11
        hc->sock = -1;
582 11
        bprintf(hc->connect, "${%s_cli_sock}", h->name);
583 11
584
        hc->txbuf_sz = hc->rxbuf_sz = 2048 * 1024;
585 11
        hc->txbuf = malloc(hc->txbuf_sz);
586 11
        AN(hc->txbuf);
587 11
        hc->rxbuf = malloc(hc->rxbuf_sz);
588 11
        AN(hc->rxbuf);
589 11
590
        return (hc);
591 11
}
592
593
/* creates a master CLI client (-mcli) */
594
static struct haproxy_cli *
595
haproxy_mcli_new(struct haproxy *h)
596 11
{
597
        struct haproxy_cli *hc;
598
599
        ALLOC_OBJ(hc, HAPROXY_CLI_MAGIC);
600 11
        AN(hc);
601 11
602
        hc->vl = h->vl;
603 11
        vtc_log_set_cmd(hc->vl, haproxy_cli_cmds);
604 11
        hc->sock = -1;
605 11
        bprintf(hc->connect, "${%s_mcli_sock}", h->name);
606 11
607
        hc->txbuf_sz = hc->rxbuf_sz = 2048 * 1024;
608 11
        hc->txbuf = malloc(hc->txbuf_sz);
609 11
        AN(hc->txbuf);
610 11
        hc->rxbuf = malloc(hc->rxbuf_sz);
611 11
        AN(hc->rxbuf);
612 11
613
        return (hc);
614 11
}
615
616
/* Bind an address/port for the master CLI (-mcli) */
617
static int
618
haproxy_create_mcli(struct haproxy *h)
619 1
{
620
        int sock;
621
        const char *err;
622
        char buf[128], addr[128], port[128];
623
        char vsabuf[vsa_suckaddr_len];
624 1
        const struct suckaddr *sua;
625
626
        sock = VTCP_listen_on(default_listen_addr, NULL, 100, &err);
627 1
        if (err != NULL)
628 1
                vtc_fatal(h->vl,
629 0
                          "Create listen socket failed: %s", err);
630 0
        assert(sock > 0);
631 1
        sua = VSA_getsockname(sock, vsabuf, sizeof vsabuf);
632 1
        AN(sua);
633 1
634
        VTCP_name(sua, addr, sizeof addr, port, sizeof port);
635 1
        bprintf(buf, "%s_mcli", h->name);
636 1
        if (VSA_Get_Proto(sua) == AF_INET)
637 1
                macro_def(h->vl, buf, "sock", "%s:%s", addr, port);
638 1
        else
639
                macro_def(h->vl, buf, "sock", "[%s]:%s", addr, port);
640 0
        macro_def(h->vl, buf, "addr", "%s", addr);
641 1
        macro_def(h->vl, buf, "port", "%s", port);
642 1
643
        return (sock);
644 1
}
645 1
646
static void
647
haproxy_cli_delete(struct haproxy_cli *hc)
648 22
{
649
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
650 22
        REPLACE(hc->spec, NULL);
651 22
        REPLACE(hc->txbuf, NULL);
652 22
        REPLACE(hc->rxbuf, NULL);
653 22
        FREE_OBJ(hc);
654 22
}
655 22
656
/**********************************************************************
657
 * Allocate and initialize a haproxy
658
 */
659
660
static struct haproxy *
661
haproxy_new(const char *name)
662 11
{
663
        struct haproxy *h;
664
        struct vsb *vsb;
665
        char buf[PATH_MAX];
666
        int closed_sock;
667
        char addr[128], port[128];
668
        const char *err;
669
        const char *env_args;
670
        char vsabuf[vsa_suckaddr_len];
671 11
        const struct suckaddr *sua;
672
673
        ALLOC_OBJ(h, HAPROXY_MAGIC);
674 11
        AN(h);
675 11
        REPLACE(h->name, name);
676 11
677
        h->args = VSB_new_auto();
678 11
        env_args = getenv(HAPROXY_ARGS_ENV_VAR);
679 11
        if (env_args) {
680 11
                VSB_cat(h->args, env_args);
681 0
                VSB_cat(h->args, " ");
682 0
        }
683 0
684
        h->vl = vtc_logopen("%s", name);
685 11
        vtc_log_set_cmd(h->vl, haproxy_cli_cmds);
686 11
        AN(h->vl);
687 11
688
        h->filename = getenv(HAPROXY_PROGRAM_ENV_VAR);
689 11
        if (h->filename == NULL)
690 11
                h->filename = "haproxy";
691 11
692
        bprintf(buf, "${tmpdir}/%s", name);
693 11
        vsb = macro_expand(h->vl, buf);
694 11
        AN(vsb);
695 11
        h->workdir = strdup(VSB_data(vsb));
696 11
        AN(h->workdir);
697 11
        VSB_destroy(&vsb);
698 11
699
        bprintf(buf, "%s/stats.sock", h->workdir);
700 11
        h->cli_fn = strdup(buf);
701 11
        AN(h->cli_fn);
702 11
703
        bprintf(buf, "%s/cfg", h->workdir);
704 11
        h->cfg_fn = strdup(buf);
705 11
        AN(h->cfg_fn);
706 11
707
        /* Create a new TCP socket to reserve an IP:port and close it asap.
708
         * May be useful to simulate an unreachable server.
709
         */
710
        bprintf(h->closed_sock, "%s_closed", h->name);
711 11
        closed_sock = VTCP_listen_on("127.0.0.1:0", NULL, 100, &err);
712 11
        if (err != NULL)
713 11
                vtc_fatal(h->vl,
714 0
                        "Create listen socket failed: %s", err);
715 0
        assert(closed_sock > 0);
716 11
        sua = VSA_getsockname(closed_sock, vsabuf, sizeof vsabuf);
717 11
        AN(sua);
718 11
        VTCP_name(sua, addr, sizeof addr, port, sizeof port);
719 11
        if (VSA_Get_Proto(sua) == AF_INET)
720 11
                macro_def(h->vl, h->closed_sock, "sock", "%s:%s", addr, port);
721 11
        else
722
                macro_def(h->vl, h->closed_sock, "sock", "[%s]:%s", addr, port);
723 0
        macro_def(h->vl, h->closed_sock, "addr", "%s", addr);
724 11
        macro_def(h->vl, h->closed_sock, "port", "%s", port);
725 11
        VTCP_close(&closed_sock);
726 11
727
        h->cli = haproxy_cli_new(h);
728 11
        AN(h->cli);
729 11
730
        h->mcli = haproxy_mcli_new(h);
731 11
        AN(h->mcli);
732 11
733
        bprintf(buf, "rm -rf \"%s\" ; mkdir -p \"%s\"", h->workdir, h->workdir);
734 11
        AZ(system(buf));
735 11
736
        h->sd_sock = -1;
737 11
738
        VTAILQ_INIT(&h->envars);
739 11
        VTAILQ_INSERT_TAIL(&haproxies, h, list);
740 11
741
        return (h);
742 11
}
743 11
744
/**********************************************************************
745
 * Delete a haproxy instance
746
 */
747
748
static void
749
haproxy_delete(struct haproxy *h)
750 11
{
751
        char buf[PATH_MAX];
752
753
        CHECK_OBJ_NOTNULL(h, HAPROXY_MAGIC);
754 11
        vtc_logclose(h->vl);
755 11
756
        if (!leave_temp) {
757 11
                bprintf(buf, "rm -rf \"%s\"", h->workdir);
758 11
                AZ(system(buf));
759 11
        }
760 11
761
        if (h->sd_sock >= 0)
762 21
                closefd(&h->sd_sock);
763 1
764
        free(h->name);
765 11
        free(h->workdir);
766 11
        free(h->cli_fn);
767 11
        free(h->cfg_fn);
768 11
        free(h->pid_fn);
769 11
        VSB_destroy(&h->args);
770 11
        haproxy_cli_delete(h->cli);
771 11
        haproxy_cli_delete(h->mcli);
772 11
773
        /* XXX: MEMLEAK (?) */
774
        FREE_OBJ(h);
775 11
}
776 11
777
/**********************************************************************
778
 * HAProxy listener
779
 */
780
781
static void *
782
haproxy_thread(void *priv)
783 11
{
784
        struct haproxy *h;
785
786
        CAST_OBJ_NOTNULL(h, priv, HAPROXY_MAGIC);
787 11
        (void)vtc_record(h->vl, h->fds[0], h->msgs);
788 11
        h->its_dead_jim = 1;
789 11
        return (NULL);
790 11
}
791
792
793
/**********************************************************************
794
 * Start a HAProxy instance.
795
 */
796
797
static void
798
haproxy_start(struct haproxy *h)
799 11
{
800
        char buf[PATH_MAX];
801
        struct vsb *vsb;
802
803
        vtc_log(h->vl, 2, "%s", __func__);
804 11
805
        AZ(VSB_finish(h->args));
806 11
        vtc_log(h->vl, 4, "opt_worker %d opt_daemon %d opt_check_mode %d opt_mcli %d",
807 22
            h->opt_worker, h->opt_daemon, h->opt_check_mode, h->opt_mcli);
808 11
809
        vsb = VSB_new_auto();
810 11
        AN(vsb);
811 11
812
        VSB_printf(vsb, "exec \"%s\"", h->filename);
813 11
        if (h->opt_check_mode)
814 11
                VSB_cat(vsb, " -c");
815 2
        else if (h->opt_daemon)
816 9
                VSB_cat(vsb, " -D");
817 3
        else
818
                VSB_cat(vsb, " -d");
819 6
820
        if (h->opt_worker) {
821 11
                if (h->opt_worker == 2) { /* sd_notify mode */
822 1
                        VSB_cat(vsb, " -Ws");
823 1
                        haproxy_bind_sdnotify(h);
824 1
                } else {
825 1
                        VSB_cat(vsb, " -W");
826 0
                }
827
                if (h->opt_mcli) {
828 1
                        int sock;
829
                        sock = haproxy_create_mcli(h);
830 1
                        VSB_printf(vsb, " -S \"fd@%d\"", sock);
831 1
                }
832 1
        }
833 1
834
        VSB_printf(vsb, " %s", VSB_data(h->args));
835 10
836
        VSB_printf(vsb, " -f \"%s\" ", h->cfg_fn);
837 10
838
        if (h->opt_worker || h->opt_daemon) {
839 10
                bprintf(buf, "%s/pid", h->workdir);
840 4
                h->pid_fn = strdup(buf);
841 4
                AN(h->pid_fn);
842 4
                VSB_printf(vsb, " -p \"%s\"", h->pid_fn);
843 4
        }
844 4
845
        AZ(VSB_finish(vsb));
846 11
        vtc_dump(h->vl, 4, "argv", VSB_data(vsb), -1);
847 11
848
        if (h->opt_worker && !h->opt_daemon) {
849 11
                /*
850
                 * HAProxy master process must exit with status 128 + <signum>
851
                 * if signaled by <signum> signal.
852
                 */
853
                h->expect_exit = HAPROXY_EXPECT_EXIT;
854 1
        }
855 1
856
        haproxy_write_conf(h);
857 11
858
        AZ(pipe(&h->fds[0]));
859 11
        vtc_log(h->vl, 4, "XXX %d @%d", h->fds[1], __LINE__);
860 11
        AZ(pipe(&h->fds[2]));
861 11
        h->pid = h->ppid = fork();
862 11
        assert(h->pid >= 0);
863 11
        if (h->pid == 0) {
864 22
                haproxy_build_env(h);
865 11
                haproxy_delete_envars(h);
866 11
                AZ(chdir(h->name));
867 11
                AZ(dup2(h->fds[0], 0));
868 11
                assert(dup2(h->fds[3], 1) == 1);
869 11
                assert(dup2(1, 2) == 2);
870 11
                closefd(&h->fds[0]);
871 11
                closefd(&h->fds[1]);
872 11
                closefd(&h->fds[2]);
873 11
                closefd(&h->fds[3]);
874 11
                AZ(execl("/bin/sh", "/bin/sh", "-c", VSB_data(vsb), (char*)0));
875 11
                exit(1);
876 0
        }
877
        VSB_destroy(&vsb);
878 11
879
        vtc_log(h->vl, 3, "PID: %ld", (long)h->pid);
880 11
        macro_def(h->vl, h->name, "pid", "%ld", (long)h->pid);
881 11
        macro_def(h->vl, h->name, "name", "%s", h->workdir);
882 11
883
        closefd(&h->fds[0]);
884 11
        closefd(&h->fds[3]);
885 11
        h->fds[0] = h->fds[2];
886 11
        h->fds[2] = h->fds[3] = -1;
887 11
888
        PTOK(pthread_create(&h->tp, NULL, haproxy_thread, h));
889 11
890
        if (h->pid_fn != NULL)
891 11
                haproxy_wait_pidfile(h);
892 4
893
        if (h->opt_worker == 2) /* sd_notify mode */
894 7
                haproxy_wait_sdnotify_ready(h);
895 1
}
896 11
897
898
/**********************************************************************
899
 * Wait for a HAProxy instance.
900
 */
901
902
static void
903
haproxy_wait(struct haproxy *h)
904 11
{
905
        void *p;
906
        int i, n, sig;
907
908
        vtc_log(h->vl, 2, "Wait");
909 11
910
        if (h->pid < 0)
911 11
                haproxy_start(h);
912 0
913
        if (h->cli->spec)
914 0
                haproxy_cli_run(h->cli);
915 0
916
        if (h->mcli->spec)
917 0
                haproxy_cli_run(h->mcli);
918 0
919
        closefd(&h->fds[1]);
920 11
921
        sig = SIGINT;
922 11
        n = 0;
923 11
        vtc_log(h->vl, 2, "Stop HAproxy pid=%ld", (long)h->pid);
924 11
        while (h->opt_daemon || (!h->opt_check_mode && !h->its_dead_jim)) {
925 77
                assert(h->pid > 0);
926 69
                if (n == 0) {
927 69
                        i = kill(h->pid, sig);
928 12
                        if (i == 0)
929 12
                                h->expect_signal = -sig;
930 9
                        if (i && errno == ESRCH)
931 15
                                break;
932 3
                        vtc_log(h->vl, 4,
933 18
                            "Kill(%d)=%d: %s", sig, i, strerror(errno));
934 9
                }
935 9
                VTIM_sleep(0.1);
936 15
                if (++n == 20) {
937 15
                        switch (sig) {
938 3
                        case SIGINT:    sig = SIGTERM ; break;
939 3
                        case SIGTERM:   sig = SIGKILL ; break;
940 0
                        default:        break;
941 0
                        }
942
                        n = 0;
943 3
                }
944 3
        }
945
946
        PTOK(pthread_join(h->tp, &p));
947 11
        AZ(p);
948 11
        closefd(&h->fds[0]);
949 11
        if (!h->opt_daemon) {
950 11
                vtc_wait4(h->vl, h->ppid, h->expect_exit, h->expect_signal, 0);
951 8
                h->ppid = -1;
952 8
        }
953 8
        h->pid = -1;
954 11
}
955 11
956
#define HAPROXY_BE_FD_STR     "fd@${"
957
#define HAPROXY_BE_FD_STRLEN  strlen(HAPROXY_BE_FD_STR)
958
959
static int
960
haproxy_build_backends(struct haproxy *h, const char *vsb_data)
961 11
{
962
        char *s, *p, *q;
963
964
        s = strdup(vsb_data);
965 11
        if (!s)
966 11
                return (-1);
967 0
968
        p = s;
969 11
        while (1) {
970 30
                int sock;
971
                char buf[128], addr[128], port[128];
972
                const char *err;
973
                char vsabuf[vsa_suckaddr_len];
974 30
                const struct suckaddr *sua;
975
976
                p = strstr(p, HAPROXY_BE_FD_STR);
977
                if (!p)
978 30
                        break;
979 30
980 11
                q = p += HAPROXY_BE_FD_STRLEN;
981
                while (*q && *q != '}')
982 19
                        q++;
983 19
                if (*q != '}')
984 80
                        break;
985 61
986 19
                *q++ = '\0';
987 0
                sock = VTCP_listen_on("127.0.0.1:0", NULL, 100, &err);
988
                if (err != NULL)
989 19
                        vtc_fatal(h->vl,
990 19
                            "Create listen socket failed: %s", err);
991 0
                assert(sock > 0);
992 0
                sua = VSA_getsockname(sock, vsabuf, sizeof vsabuf);
993
                AN(sua);
994 19
995
                VTCP_name(sua, addr, sizeof addr, port, sizeof port);
996 19
                bprintf(buf, "%s_%s", h->name, p);
997 0
                if (VSA_Get_Proto(sua) == AF_INET)
998 0
                        macro_def(h->vl, buf, "sock", "%s:%s", addr, port);
999 19
                else
1000 19
                        macro_def(h->vl, buf, "sock", "[%s]:%s", addr, port);
1001 19
                macro_def(h->vl, buf, "addr", "%s", addr);
1002
                macro_def(h->vl, buf, "port", "%s", port);
1003 19
1004 19
                bprintf(buf, "%d", sock);
1005 19
                vtc_log(h->vl, 4, "setenv(%s, %s)", p, buf);
1006 19
                haproxy_add_envar(h, p, buf);
1007
                p = q;
1008 0
        }
1009 19
        free(s);
1010 19
        return (0);
1011
}
1012 19
1013 19
static void
1014 19
haproxy_check_conf(struct haproxy *h, const char *expect)
1015 19
{
1016 30
1017 11
        h->msgs = VSB_new_auto();
1018 11
        AN(h->msgs);
1019 11
        h->opt_check_mode = 1;
1020
        haproxy_start(h);
1021
        haproxy_wait(h);
1022 2
        AZ(VSB_finish(h->msgs));
1023
        if (strstr(VSB_data(h->msgs), expect) == NULL)
1024
                vtc_fatal(h->vl, "Did not find expected string '%s'", expect);
1025 2
        vtc_log(h->vl, 2, "Found expected '%s'", expect);
1026 2
        VSB_destroy(&h->msgs);
1027 2
}
1028 2
1029 2
/**********************************************************************
1030 2
 * Write a configuration for <h> HAProxy instance.
1031 2
 */
1032 0
1033 2
static void
1034 2
haproxy_store_conf(struct haproxy *h, const char *cfg, int auto_be)
1035 2
{
1036
        struct vsb *vsb, *vsb2;
1037
1038
        vsb = VSB_new_auto();
1039
        AN(vsb);
1040
1041
        vsb2 = VSB_new_auto();
1042 11
        AN(vsb2);
1043
1044
        VSB_printf(vsb, "    global\n\tstats socket \"%s\" "
1045
                   "level admin mode 600\n", h->cli_fn);
1046 11
        VSB_cat(vsb, "    stats socket \"fd@${cli}\" level admin\n");
1047 11
        AZ(VSB_cat(vsb, cfg));
1048
1049 11
        if (auto_be)
1050 11
                cmd_server_gen_haproxy_conf(vsb);
1051
1052 22
        AZ(VSB_finish(vsb));
1053 11
1054 11
        AZ(haproxy_build_backends(h, VSB_data(vsb)));
1055 11
1056
        h->cfg_vsb = macro_expand(h->vl, VSB_data(vsb));
1057 11
        AN(h->cfg_vsb);
1058 1
1059
        VSB_destroy(&vsb2);
1060 11
        VSB_destroy(&vsb);
1061
}
1062 11
1063
static void
1064 11
haproxy_write_conf(struct haproxy *h)
1065 11
{
1066
        struct vsb *vsb;
1067 11
1068 11
        vsb = macro_expand(h->vl, VSB_data(h->cfg_vsb));
1069 11
        AN(vsb);
1070
        assert(VSB_len(vsb) >= 0);
1071
1072 11
        vtc_dump(h->vl, 4, "conf", VSB_data(vsb), VSB_len(vsb));
1073
        if (VFIL_writefile(h->workdir, h->cfg_fn,
1074
            VSB_data(vsb), VSB_len(vsb)) != 0)
1075
                vtc_fatal(h->vl,
1076 11
                    "failed to write haproxy configuration file: %s (%d)",
1077 11
                    strerror(errno), errno);
1078 11
1079
        VSB_destroy(&vsb);
1080 11
}
1081 33
1082 22
/* SECTION: haproxy haproxy
1083 0
 *
1084
 * Define and interact with haproxy instances.
1085 0
 *
1086
 * To define a haproxy server, you'll use this syntax::
1087 11
 *
1088 11
 *      haproxy hNAME -conf-OK CONFIG
1089
 *      haproxy hNAME -conf-BAD ERROR CONFIG
1090
 *      haproxy hNAME [-D] [-W] [-arg STRING] [-conf[+vcl] STRING]
1091
 *
1092
 * The first ``haproxy hNAME`` invocation will start the haproxy master
1093
 * process in the background, waiting for the ``-start`` switch to actually
1094
 * start the child.
1095
 *
1096
 * Arguments:
1097
 *
1098
 * hNAME
1099
 *         Identify the HAProxy server with a string, it must starts with 'h'.
1100
 *
1101
 * \-conf-OK CONFIG
1102
 *         Run haproxy in '-c' mode to check config is OK
1103
 *         stdout/stderr should contain 'Configuration file is valid'
1104
 *         The exit code should be 0.
1105
 *
1106
 * \-conf-BAD ERROR CONFIG
1107
 *         Run haproxy in '-c' mode to check config is BAD.
1108
 *         "ERROR" should be part of the diagnostics on stdout/stderr.
1109
 *         The exit code should be 1.
1110
 *
1111
 * \-D
1112
 *         Run HAproxy in daemon mode.  If not given '-d' mode used.
1113
 *
1114
 * \-W
1115
 *         Enable HAproxy in Worker mode.
1116
 *
1117
 * \-S
1118
 *         Enable HAproxy Master CLI in Worker mode
1119
 *
1120
 * \-arg STRING
1121
 *         Pass an argument to haproxy, for example "-h simple_list".
1122
 *
1123
 * \-cli STRING
1124
 *         Specify the spec to be run by the command line interface (CLI).
1125
 *
1126
 * \-mcli STRING
1127
 *         Specify the spec to be run by the command line interface (CLI)
1128
 *         of the Master process.
1129
 *
1130
 * \-conf STRING
1131
 *         Specify the configuration to be loaded by this HAProxy instance.
1132
 *
1133
 * \-conf+backend STRING
1134
 *         Specify the configuration to be loaded by this HAProxy instance,
1135
 *         all server instances will be automatically appended
1136
 *
1137
 * \-start
1138
 *         Start this HAProxy instance.
1139
 *
1140
 * \-wait
1141
 *         Stop this HAProxy instance.
1142
 *
1143
 * \-expectexit NUMBER
1144
 *         Expect haproxy to exit(3) with this value
1145
 *
1146
 */
1147
1148
void
1149
cmd_haproxy(CMD_ARGS)
1150
{
1151
        struct haproxy *h, *h2;
1152
1153
        (void)priv;
1154
1155
        if (av == NULL) {
1156
                /* Reset and free */
1157 1026
                VTAILQ_FOREACH_SAFE(h, &haproxies, list, h2) {
1158
                        vtc_log(h->vl, 2,
1159
                            "Reset and free %s haproxy %ld",
1160
                            h->name, (long)h->pid);
1161 1026
                        if (h->pid >= 0)
1162
                                haproxy_wait(h);
1163 1026
                        VTAILQ_REMOVE(&haproxies, h, list);
1164
                        haproxy_delete(h);
1165 1024
                }
1166 22
                return;
1167
        }
1168 11
1169 11
        AZ(strcmp(av[0], "haproxy"));
1170 7
        av++;
1171 11
1172 11
        VTC_CHECK_NAME(vl, av[0], "haproxy", 'h');
1173 11
        VTAILQ_FOREACH(h, &haproxies, list)
1174 1013
                if (!strcmp(h->name, av[0]))
1175
                        break;
1176
        if (h == NULL)
1177 13
                h = haproxy_new(av[0]);
1178 13
        av++;
1179
1180 13
        for (; *av != NULL; av++) {
1181 15
                if (vtc_error)
1182 4
                        break;
1183 2
1184 11
                if (!strcmp(*av, "-conf-OK")) {
1185 11
                        AN(av[1]);
1186 13
                        haproxy_store_conf(h, av[1], 0);
1187
                        h->expect_exit = 0;
1188 42
                        haproxy_check_conf(h, "");
1189 29
                        av++;
1190 0
                        continue;
1191
                }
1192 29
                if (!strcmp(*av, "-conf-BAD")) {
1193 1
                        AN(av[1]);
1194 1
                        AN(av[2]);
1195 1
                        haproxy_store_conf(h, av[2], 0);
1196 1
                        h->expect_exit = 1;
1197 1
                        haproxy_check_conf(h, av[1]);
1198 1
                        av += 2;
1199
                        continue;
1200 28
                }
1201 1
1202 1
                if (!strcmp(*av, HAPROXY_OPT_DAEMON)) {
1203 1
                        h->opt_daemon = 1;
1204 1
                        continue;
1205 1
                }
1206 1
                if (!strcmp(*av, HAPROXY_OPT_WORKER)) {
1207 1
                        h->opt_worker = 1;
1208
                        continue;
1209
                }
1210 27
                if (!strcmp(*av, HAPROXY_OPT_SD_WORKER)) {
1211 3
                        h->opt_worker = 2;
1212 3
                        continue;
1213
                }
1214 24
                if (!strcmp(*av, HAPROXY_OPT_MCLI)) {
1215 0
                        h->opt_mcli = 1;
1216 0
                        continue;
1217
                }
1218 24
                if (!strcmp(*av, "-arg")) {
1219 1
                        AN(av[1]);
1220 1
                        AZ(h->pid);
1221
                        VSB_cat(h->args, " ");
1222 23
                        VSB_cat(h->args, av[1]);
1223 1
                        av++;
1224 1
                        continue;
1225
                }
1226 22
1227 0
                if (!strcmp(*av, "-cli")) {
1228 0
                        REPLACE(h->cli->spec, av[1]);
1229 0
                        if (h->tp)
1230 0
                                haproxy_cli_run(h->cli);
1231 0
                        av++;
1232 0
                        continue;
1233
                }
1234
1235 22
                if (!strcmp(*av, "-mcli")) {
1236 1
                        REPLACE(h->mcli->spec, av[1]);
1237 1
                        if (h->tp)
1238 1
                                haproxy_cli_run(h->mcli);
1239 1
                        av++;
1240 1
                        continue;
1241
                }
1242
1243 21
                if (!strcmp(*av, "-conf")) {
1244 1
                        AN(av[1]);
1245 1
                        haproxy_store_conf(h, av[1], 0);
1246 1
                        av++;
1247 1
                        continue;
1248 1
                }
1249
                if (!strcmp(*av, "-conf+backend")) {
1250
                        AN(av[1]);
1251 20
                        haproxy_store_conf(h, av[1], 1);
1252 8
                        av++;
1253 8
                        continue;
1254 8
                }
1255 8
1256
                if (!strcmp(*av, "-expectexit")) {
1257 12
                        h->expect_exit = strtoul(av[1], NULL, 0);
1258 1
                        av++;
1259 1
                        continue;
1260 1
                }
1261 1
                if (!strcmp(*av, "-start")) {
1262
                        haproxy_start(h);
1263
                        continue;
1264 11
                }
1265 0
                if (!strcmp(*av, "-wait")) {
1266 0
                        haproxy_wait(h);
1267 0
                        continue;
1268
                }
1269 11
                vtc_fatal(h->vl, "Unknown haproxy argument: %s", *av);
1270 9
        }
1271 9
}