varnish-cache/bin/varnishtest/vtest2/src/vtc_haproxy.c
0
/*-
1
 * Copyright (c) 2008-2018 Varnish Software AS
2
 * All rights reserved.
3
 *
4
 * Author: Frédéric Lécaille <flecaille@haproxy.com>
5
 *
6
 * SPDX-License-Identifier: BSD-2-Clause
7
 *
8
 * Redistribution and use in source and binary forms, with or without
9
 * modification, are permitted provided that the following conditions
10
 * are met:
11
 * 1. Redistributions of source code must retain the above copyright
12
 *    notice, this list of conditions and the following disclaimer.
13
 * 2. Redistributions in binary form must reproduce the above copyright
14
 *    notice, this list of conditions and the following disclaimer in the
15
 *    documentation and/or other materials provided with the distribution.
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20
 * ARE DISCLAIMED.  IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE
21
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27
 * SUCH DAMAGE.
28
 */
29
30
#include "config.h"
31
32
#include <inttypes.h>
33
#include <poll.h>
34
#include <stdio.h>
35
#include <stdlib.h>
36
#include <string.h>
37
#include <sys/stat.h> /* for MUSL (mode_t) */
38
#include <sys/types.h>
39
#include <sys/socket.h>
40
#include <sys/un.h>
41
#include <unistd.h>
42
43
#include "vtc.h"
44
45
#include "vfil.h"
46
#include "vpf.h"
47
#include "vre.h"
48
#include "vtcp.h"
49
#include "vsa.h"
50
#include "vtim.h"
51
52
#define HAPROXY_PROGRAM_ENV_VAR "HAPROXY_PROGRAM"
53
#define HAPROXY_ARGS_ENV_VAR    "HAPROXY_ARGS"
54
#define HAPROXY_OPT_WORKER      "-W"
55
#define HAPROXY_OPT_SD_WORKER   "-Ws"
56
#define HAPROXY_OPT_MCLI        "-S"
57
#define HAPROXY_OPT_DAEMON      "-D"
58
#define HAPROXY_SIGNAL          SIGINT
59
#define HAPROXY_EXPECT_EXIT     (128 + HAPROXY_SIGNAL)
60
61
struct envar {
62
        VTAILQ_ENTRY(envar) list;
63
        char *name;
64
        char *value;
65
};
66
67
struct haproxy {
68
        unsigned                magic;
69
#define HAPROXY_MAGIC           0x8a45cf75
70
        char                    *name;
71
        struct vtclog           *vl;
72
        VTAILQ_ENTRY(haproxy)   list;
73
74
        const char              *filename;
75
        struct vsb              *args;
76
        int                     opt_worker;
77
        int                     opt_mcli;
78
        int                     opt_daemon;
79
        int                     opt_check_mode;
80
        char                    *pid_fn;
81
        pid_t                   pid;
82
        pid_t                   ppid;
83
        int                     fds[4];
84
        char                    *cfg_fn;
85
        struct vsb              *cfg_vsb;
86
87
        pthread_t               tp;
88
        int                     expect_exit;
89
        int                     expect_signal;
90
        int                     its_dead_jim;
91
92
        /* sd_notify unix socket */
93
        struct sockaddr_un      sd_uds;
94
        int                     sd_sock;
95
96
        /* UNIX socket CLI. */
97
        char                    *cli_fn;
98
        /* TCP socket CLI. */
99
        struct haproxy_cli *cli;
100
101
        /* master CLI */
102
        struct haproxy_cli *mcli;
103
104
        char                    *workdir;
105
        struct vsb              *msgs;
106
        char                    closed_sock[256]; /* Closed TCP socket */
107
        VTAILQ_HEAD(,envar) envars;
108
};
109
110
static VTAILQ_HEAD(, haproxy)   haproxies =
111
    VTAILQ_HEAD_INITIALIZER(haproxies);
112
113
struct haproxy_cli {
114
        unsigned                magic;
115
#define HAPROXY_CLI_MAGIC       0xb09a4ed8
116
        struct vtclog           *vl;
117
        char                    running;
118
119
        char                    *spec;
120
121
        int                     sock;
122
        char                    connect[256];
123
124
        pthread_t               tp;
125
        size_t                  txbuf_sz;
126
        char                    *txbuf;
127
        size_t                  rxbuf_sz;
128
        char                    *rxbuf;
129
130
        vtim_dur                timeout;
131
};
132
133
static void haproxy_write_conf(struct haproxy *h);
134
135
static void
136 17
haproxy_add_envar(struct haproxy *h,
137
                  const char *name, const char *value)
138
{
139
        struct envar *e;
140
141 17
        e = malloc(sizeof *e);
142 17
        AN(e);
143 17
        e->name = strdup(name);
144 17
        e->value = strdup(value);
145 17
        AN(e->name);
146 17
        AN(e->value);
147 17
        VTAILQ_INSERT_TAIL(&h->envars, e, list);
148 17
}
149
150
static void
151 10
haproxy_delete_envars(struct haproxy *h)
152
{
153
        struct envar *e, *e2;
154 27
        VTAILQ_FOREACH_SAFE(e, &h->envars, list, e2) {
155 17
                VTAILQ_REMOVE(&h->envars, e, list);
156 17
                free(e->name);
157 17
                free(e->value);
158 17
                free(e);
159 17
        }
160 10
}
161
162
static void
163 10
haproxy_build_env(const struct haproxy *h)
164
{
165
        struct envar *e;
166
167 27
        VTAILQ_FOREACH(e, &h->envars, list) {
168 17
                if (setenv(e->name, e->value, 0) == -1)
169 0
                        vtc_fatal(h->vl, "setenv() failed: %s (%d)",
170 0
                                  strerror(errno), errno);
171 17
        }
172 10
}
173
174
/**********************************************************************
175
 * Socket connect (same as client_tcp_connect()).
176
 */
177
178
static int
179 1
haproxy_cli_tcp_connect(struct vtclog *vl, const char *addr, vtim_dur tmo,
180
    const char **errp)
181
{
182
        int fd;
183
        char mabuf[VTCP_ADDRBUFSIZE], mpbuf[VTCP_PORTBUFSIZE];
184
185 1
        AN(addr);
186 1
        AN(errp);
187 1
        fd = VTCP_open(addr, NULL, tmo, errp);
188 1
        if (fd < 0)
189 0
                return (fd);
190 1
        VTCP_myname(fd, mabuf, sizeof mabuf, mpbuf, sizeof mpbuf);
191 2
        vtc_log(vl, 3,
192 1
            "CLI connected fd %d from %s %s to %s", fd, mabuf, mpbuf, addr);
193 1
        return (fd);
194 1
}
195
196
/*
197
 * SECTION: haproxy.cli haproxy CLI Specification
198
 * SECTION: haproxy.cli.send
199
 * send STRING
200
 *         Push STRING on the CLI connection. STRING will be terminated by an
201
 *         end of line character (\n).
202
 */
203
static void v_matchproto_(cmd_f)
204 1
cmd_haproxy_cli_send(CMD_ARGS)
205
{
206
        struct vsb *vsb;
207
        struct haproxy_cli *hc;
208
        int j;
209
210 1
        (void)vl;
211 1
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
212 1
        AZ(strcmp(av[0], "send"));
213 1
        AN(av[1]);
214 1
        AZ(av[2]);
215
216 1
        vsb = VSB_new_auto();
217 1
        AN(vsb);
218 1
        AZ(VSB_cat(vsb, av[1]));
219 1
        AZ(VSB_cat(vsb, "\n"));
220 1
        AZ(VSB_finish(vsb));
221 1
        if (hc->sock == -1) {
222
                int fd;
223
                const char *err;
224
                struct vsb *vsb_connect;
225
226 0
                vsb_connect = macro_expand(hc->vl, hc->connect);
227 0
                AN(vsb_connect);
228 0
                fd = haproxy_cli_tcp_connect(hc->vl,
229 0
                    VSB_data(vsb_connect), 10., &err);
230 0
                if (fd < 0)
231 0
                        vtc_fatal(hc->vl,
232 0
                            "CLI failed to open %s: %s", VSB_data(vsb), err);
233 0
                VSB_destroy(&vsb_connect);
234 0
                hc->sock = fd;
235 0
        }
236 1
        vtc_dump(hc->vl, 4, "CLI send", VSB_data(vsb), -1);
237
238 1
        if (VSB_tofile(vsb, hc->sock))
239 0
                vtc_fatal(hc->vl,
240 0
                    "CLI fd %d send error %s", hc->sock, strerror(errno));
241
242
        /* a CLI command must be followed by a SHUT_WR if we want HAProxy to
243
         * close after the response */
244 1
        j = shutdown(hc->sock, SHUT_WR);
245 1
        vtc_log(hc->vl, 3, "CLI shutting fd %d", hc->sock);
246 1
        if (!VTCP_Check(j))
247 0
                vtc_fatal(hc->vl, "Shutdown failed: %s", strerror(errno));
248
249 1
        VSB_destroy(&vsb);
250 1
}
251
252
#define HAPROXY_CLI_RECV_LEN (1 << 14)
253
static void
254 1
haproxy_cli_recv(struct haproxy_cli *hc)
255
{
256
        ssize_t ret;
257
        size_t rdz, left, off;
258
259 1
        rdz = ret = off = 0;
260
        /* We want to null terminate this buffer. */
261 1
        left = hc->rxbuf_sz - 1;
262 2
        while (!vtc_error && left > 0) {
263 2
                VTCP_set_read_timeout(hc->sock, hc->timeout);
264
265 2
                ret = recv(hc->sock, hc->rxbuf + off, HAPROXY_CLI_RECV_LEN, 0);
266 2
                if (ret < 0) {
267 0
                        if (errno == EINTR || errno == EAGAIN)
268 0
                                continue;
269
270 0
                        vtc_fatal(hc->vl,
271
                            "CLI fd %d recv() failed (%s)",
272 0
                            hc->sock, strerror(errno));
273
                }
274
                /* Connection closed. */
275 2
                if (ret == 0) {
276 1
                        if (rdz > 0 && hc->rxbuf[rdz - 1] != '\n')
277 0
                                vtc_fatal(hc->vl,
278
                                    "CLI rx timeout (fd: %d %.3fs ret: %zd)",
279 0
                                    hc->sock, hc->timeout, ret);
280
281 1
                        vtc_log(hc->vl, 4, "CLI connection normally closed");
282 1
                        vtc_log(hc->vl, 3, "CLI closing fd %d", hc->sock);
283 1
                        VTCP_close(&hc->sock);
284 1
                        break;
285
                }
286
287 1
                rdz += ret;
288 1
                left -= ret;
289 1
                off  += ret;
290
        }
291 1
        hc->rxbuf[rdz] = '\0';
292 1
        vtc_dump(hc->vl, 4, "CLI recv", hc->rxbuf, rdz);
293 1
}
294
295
/*
296
 * SECTION: haproxy.cli.expect
297
 * expect OP STRING
298
 *         Regex match the CLI reception buffer with STRING
299
 *         if OP is ~ or, on the contrary, if OP is !~ check that there is
300
 *         no regex match.
301
 */
302
static void v_matchproto_(cmd_f)
303 1
cmd_haproxy_cli_expect(CMD_ARGS)
304
{
305
        struct haproxy_cli *hc;
306
        struct vsb vsb[1];
307
        vre_t *vre;
308
        int error, erroroffset, i, ret;
309
        char *cmp, *spec, errbuf[VRE_ERROR_LEN];
310
311 1
        (void)vl;
312 1
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
313 1
        AZ(strcmp(av[0], "expect"));
314 1
        av++;
315
316 1
        cmp = av[0];
317 1
        spec = av[1];
318 1
        AN(cmp);
319 1
        AN(spec);
320 1
        AZ(av[2]);
321
322 1
        assert(!strcmp(cmp, "~") || !strcmp(cmp, "!~"));
323
324 1
        haproxy_cli_recv(hc);
325
326 1
        vre = VRE_compile(spec, 0, &error, &erroroffset, 1);
327 1
        if (vre == NULL) {
328 0
                AN(VSB_init(vsb, errbuf, sizeof errbuf));
329 0
                AZ(VRE_error(vsb, error));
330 0
                AZ(VSB_finish(vsb));
331 0
                VSB_fini(vsb);
332 0
                vtc_fatal(hc->vl, "CLI regexp error: '%s' (@%d) (%s)",
333 0
                    errbuf, erroroffset, spec);
334
        }
335
336 1
        i = VRE_match(vre, hc->rxbuf, 0, 0, NULL);
337
338 1
        VRE_free(&vre);
339
340 1
        ret = (i >= 0 && *cmp == '~') || (i < 0 && *cmp == '!');
341 1
        if (!ret)
342 0
                vtc_fatal(hc->vl, "CLI expect failed %s \"%s\"", cmp, spec);
343
        else
344 1
                vtc_log(hc->vl, 4, "CLI expect match %s \"%s\"", cmp, spec);
345 1
}
346
347
static const struct cmds haproxy_cli_cmds[] = {
348
#define CMD_HAPROXY_CLI(n) { #n, cmd_haproxy_cli_##n },
349
        CMD_HAPROXY_CLI(send)
350
        CMD_HAPROXY_CLI(expect)
351
#undef CMD_HAPROXY_CLI
352
        { NULL, NULL }
353
};
354
355
/**********************************************************************
356
 * HAProxy CLI client thread
357
 */
358
359
static void *
360 1
haproxy_cli_thread(void *priv)
361
{
362
        struct haproxy_cli *hc;
363
        struct vsb *vsb;
364
        int fd;
365
        const char *err;
366
367 1
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
368 1
        AN(*hc->connect);
369
370 1
        vsb = macro_expand(hc->vl, hc->connect);
371 1
        AN(vsb);
372
373 1
        fd = haproxy_cli_tcp_connect(hc->vl, VSB_data(vsb), 10., &err);
374 1
        if (fd < 0)
375 0
                vtc_fatal(hc->vl,
376 0
                    "CLI failed to open %s: %s", VSB_data(vsb), err);
377 1
        VTCP_blocking(fd);
378 1
        hc->sock = fd;
379 1
        parse_string(hc->vl, hc, hc->spec);
380 1
        vtc_log(hc->vl, 2, "CLI ending");
381 1
        VSB_destroy(&vsb);
382 1
        return (NULL);
383
}
384
385
/**********************************************************************
386
 * Wait for the CLI client thread to stop
387
 */
388
389
static void
390 1
haproxy_cli_wait(struct haproxy_cli *hc)
391
{
392
        void *res;
393
394 1
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
395 1
        vtc_log(hc->vl, 2, "CLI waiting");
396 1
        PTOK(pthread_join(hc->tp, &res));
397 1
        if (res != NULL)
398 0
                vtc_fatal(hc->vl, "CLI returned \"%s\"", (char *)res);
399 1
        REPLACE(hc->spec, NULL);
400 1
        hc->tp = 0;
401 1
        hc->running = 0;
402 1
}
403
404
/**********************************************************************
405
 * Start the CLI client thread
406
 */
407
408
static void
409 1
haproxy_cli_start(struct haproxy_cli *hc)
410
{
411 1
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
412 1
        vtc_log(hc->vl, 2, "CLI starting");
413 1
        PTOK(pthread_create(&hc->tp, NULL, haproxy_cli_thread, hc));
414 1
        hc->running = 1;
415
416 1
}
417
418
/**********************************************************************
419
 * Run the CLI client thread
420
 */
421
422
static void
423 1
haproxy_cli_run(struct haproxy_cli *hc)
424
{
425 1
        haproxy_cli_start(hc);
426 1
        haproxy_cli_wait(hc);
427 1
}
428
429
/**********************************************************************
430
 * Wait for the pidfile
431
 */
432
433
static void
434 3
haproxy_wait_pidfile(struct haproxy *h)
435
{
436 3
        char buf_err[1024] = {0};
437 3
        int usleep_time = 1000;
438
        double t0;
439
        pid_t pid;
440
441 3
        vtc_log(h->vl, 3, "wait-pid-file");
442 83
        for (t0 = VTIM_mono(); VTIM_mono() - t0 < 3;) {
443 83
                if (vtc_error)
444 0
                        return;
445
446 83
                if (VPF_Read(h->pid_fn, &pid) != 0) {
447 80
                        bprintf(buf_err,
448
                            "Could not read PID file '%s'", h->pid_fn);
449 80
                        usleep(usleep_time);
450 80
                        continue;
451
                }
452
453 3
                if (!h->opt_daemon && pid != h->pid) {
454 0
                        bprintf(buf_err,
455
                            "PID file has different PID (%ld != %lld)",
456
                            (long)pid, (long long)h->pid);
457 0
                        usleep(usleep_time);
458 0
                        continue;
459
                }
460
461 3
                if (kill(pid, 0) < 0) {
462 0
                        bprintf(buf_err,
463
                            "Could not find PID %ld process", (long)pid);
464 0
                        usleep(usleep_time);
465 0
                        continue;
466
                }
467
468 3
                h->pid = pid;
469
470 6
                vtc_log(h->vl, 2, "haproxy PID %ld successfully started",
471 3
                    (long)pid);
472 3
                return;
473
        }
474 0
        vtc_fatal(h->vl, "haproxy %s PID file check failed:\n\t%s\n",
475 0
                  h->name, buf_err);
476 3
}
477
478
/**********************************************************************
479
 * Bind the sd_notify socket
480
 */
481
static void
482 0
haproxy_bind_sdnotify(struct haproxy *h)
483
{
484
        char sd_path[PATH_MAX];
485
        int sd;
486
        int ret;
487 0
        const char *err = NULL;
488 0
        struct sockaddr_un *uds = &h->sd_uds;
489 0
        socklen_t sl = sizeof(*uds);
490
491 0
        bprintf(sd_path, "%s/sd_notify.sock", h->workdir);
492 0
        assert(sd_path[0] == '/');
493
494 0
        if (strlen(sd_path) + 1 > sizeof(uds->sun_path)) {
495 0
                vtc_fatal(h->vl, "Path %s too long for a Unix domain socket", sd_path);
496
        }
497 0
        memset(uds->sun_path, 0, sizeof(uds->sun_path));
498 0
        bprintf(uds->sun_path, "%s", sd_path);
499 0
        uds->sun_family = PF_UNIX;
500
501 0
        sd = socket(AF_UNIX, SOCK_DGRAM, 0);
502 0
        if (sd < 0) {
503 0
                err = "socket(2)";
504 0
                goto error;
505
        }
506
507 0
        if (unlink(uds->sun_path) != 0 && errno != ENOENT) {
508 0
                err = "unlink(2)";
509 0
                closefd(&sd);
510 0
                goto error;
511
        }
512
513 0
        if (bind(sd, (const void*)uds, sl) != 0) {
514 0
                err = "bind(2)";
515 0
                closefd(&sd);
516 0
                goto error;
517
        }
518
519 0
        h->sd_sock = sd;
520
521 0
        assert(h->sd_sock > 0);
522 0
        vtc_log(h->vl, 4, "sd_notify %s", sd_path);
523 0
        ret = setenv("NOTIFY_SOCKET", sd_path, 1);
524 0
        assert(ret == 0);
525
526
error:
527 0
        if (err != NULL)
528 0
                vtc_fatal(h->vl, "Create sd_notify socket failed: %s", err);
529 0
}
530
531
/**********************************************************************
532
 * Wait for the "READY" from sd_notify
533
 */
534
static void
535 0
haproxy_wait_sdnotify_ready(struct haproxy *h)
536
{
537
        struct pollfd fd[1];
538
        char buf[BUFSIZ];
539
        int i, r;
540 0
        char *ready = NULL;
541
542 0
        vtc_log(h->vl, 3, "wait-sdnotify-ready");
543
544
        /* First try to do an accept on h->sd_sock */
545 0
        memset(fd, 0, sizeof(fd));
546 0
        fd[0].fd = h->sd_sock;
547 0
        fd[0].events = POLLIN;
548
549 0
        i = poll(fd, 1, vtc_maxdur * 1000 / 3);
550 0
        vtc_log(h->vl, 4, "sd_notify recv poll %d 0x%x ", i, fd[0].revents);
551 0
        if (i == 0)
552 0
                vtc_fatal(h->vl, "FAIL timeout waiting for sd_notify recv");
553 0
        if (!(fd[0].revents & POLLIN))
554 0
                vtc_fatal(h->vl, "FAIL sd_notify recv wait failure");
555
556 0
        r = recv(h->sd_sock, buf, sizeof(buf) - 1, 0);
557 0
        if (r > 0) {
558 0
                buf[r] = '\0';
559 0
                ready = strstr(buf, "READY=1");
560 0
        }
561
562 0
        if (!ready)
563 0
                vtc_fatal(h->vl, "FAIL sd_notify recv READY failure");
564
        else
565 0
                vtc_log(h->vl, 3, "sd_notify READY=1");
566 0
}
567
/**********************************************************************
568
 * Allocate and initialize a CLI client
569
 */
570
571
static struct haproxy_cli *
572 10
haproxy_cli_new(struct haproxy *h)
573
{
574
        struct haproxy_cli *hc;
575
576 10
        ALLOC_OBJ(hc, HAPROXY_CLI_MAGIC);
577 10
        AN(hc);
578
579 10
        hc->vl = h->vl;
580 10
        vtc_log_set_cmd(hc->vl, haproxy_cli_cmds);
581 10
        hc->sock = -1;
582 10
        bprintf(hc->connect, "${%s_cli_sock}", h->name);
583
584 10
        hc->txbuf_sz = hc->rxbuf_sz = 2048 * 1024;
585 10
        hc->txbuf = malloc(hc->txbuf_sz);
586 10
        AN(hc->txbuf);
587 10
        hc->rxbuf = malloc(hc->rxbuf_sz);
588 10
        AN(hc->rxbuf);
589
590 10
        return (hc);
591
}
592
593
/* creates a master CLI client (-mcli) */
594
static struct haproxy_cli *
595 10
haproxy_mcli_new(struct haproxy *h)
596
{
597
        struct haproxy_cli *hc;
598
599 10
        ALLOC_OBJ(hc, HAPROXY_CLI_MAGIC);
600 10
        AN(hc);
601
602 10
        hc->vl = h->vl;
603 10
        vtc_log_set_cmd(hc->vl, haproxy_cli_cmds);
604 10
        hc->sock = -1;
605 10
        bprintf(hc->connect, "${%s_mcli_sock}", h->name);
606
607 10
        hc->txbuf_sz = hc->rxbuf_sz = 2048 * 1024;
608 10
        hc->txbuf = malloc(hc->txbuf_sz);
609 10
        AN(hc->txbuf);
610 10
        hc->rxbuf = malloc(hc->rxbuf_sz);
611 10
        AN(hc->rxbuf);
612
613 10
        return (hc);
614
}
615
616
/* Bind an address/port for the master CLI (-mcli) */
617
static int
618 0
haproxy_create_mcli(struct haproxy *h)
619
{
620
        int sock;
621
        const char *err;
622
        char buf[128], addr[128], port[128];
623 0
        char vsabuf[vsa_suckaddr_len];
624
        const struct suckaddr *sua;
625
626 0
        sock = VTCP_listen_on(default_listen_addr, NULL, 100, &err);
627 0
        if (err != NULL)
628 0
                vtc_fatal(h->vl,
629 0
                          "Create listen socket failed: %s", err);
630 0
        assert(sock > 0);
631 0
        sua = VSA_getsockname(sock, vsabuf, sizeof vsabuf);
632 0
        AN(sua);
633
634 0
        VTCP_name(sua, addr, sizeof addr, port, sizeof port);
635 0
        bprintf(buf, "%s_mcli", h->name);
636 0
        if (VSA_Get_Proto(sua) == AF_INET)
637 0
                macro_def(h->vl, buf, "sock", "%s:%s", addr, port);
638
        else
639 0
                macro_def(h->vl, buf, "sock", "[%s]:%s", addr, port);
640 0
        macro_def(h->vl, buf, "addr", "%s", addr);
641 0
        macro_def(h->vl, buf, "port", "%s", port);
642
643 0
        return (sock);
644 0
}
645
646
static void
647 20
haproxy_cli_delete(struct haproxy_cli *hc)
648
{
649 20
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
650 20
        REPLACE(hc->spec, NULL);
651 20
        REPLACE(hc->txbuf, NULL);
652 20
        REPLACE(hc->rxbuf, NULL);
653 20
        FREE_OBJ(hc);
654 20
}
655
656
/**********************************************************************
657
 * Allocate and initialize a haproxy
658
 */
659
660
static struct haproxy *
661 10
haproxy_new(const char *name)
662
{
663
        struct haproxy *h;
664
        struct vsb *vsb;
665
        char buf[PATH_MAX];
666
        int closed_sock;
667
        char addr[128], port[128];
668
        const char *err;
669
        const char *env_args;
670 10
        char vsabuf[vsa_suckaddr_len];
671
        const struct suckaddr *sua;
672
673 10
        ALLOC_OBJ(h, HAPROXY_MAGIC);
674 10
        AN(h);
675 10
        REPLACE(h->name, name);
676
677 10
        h->args = VSB_new_auto();
678 10
        env_args = getenv(HAPROXY_ARGS_ENV_VAR);
679 10
        if (env_args) {
680 0
                VSB_cat(h->args, env_args);
681 0
                VSB_cat(h->args, " ");
682 0
        }
683
684 10
        h->vl = vtc_logopen("%s", name);
685 10
        vtc_log_set_cmd(h->vl, haproxy_cli_cmds);
686 10
        AN(h->vl);
687
688 10
        h->filename = getenv(HAPROXY_PROGRAM_ENV_VAR);
689 10
        if (h->filename == NULL)
690 10
                h->filename = "haproxy";
691
692 10
        bprintf(buf, "${tmpdir}/%s", name);
693 10
        vsb = macro_expand(h->vl, buf);
694 10
        AN(vsb);
695 10
        h->workdir = strdup(VSB_data(vsb));
696 10
        AN(h->workdir);
697 10
        VSB_destroy(&vsb);
698
699 10
        bprintf(buf, "%s/stats.sock", h->workdir);
700 10
        h->cli_fn = strdup(buf);
701 10
        AN(h->cli_fn);
702
703 10
        bprintf(buf, "%s/cfg", h->workdir);
704 10
        h->cfg_fn = strdup(buf);
705 10
        AN(h->cfg_fn);
706
707
        /* Create a new TCP socket to reserve an IP:port and close it asap.
708
         * May be useful to simulate an unreachable server.
709
         */
710 10
        bprintf(h->closed_sock, "%s_closed", h->name);
711 10
        closed_sock = VTCP_listen_on("127.0.0.1:0", NULL, 100, &err);
712 10
        if (err != NULL)
713 0
                vtc_fatal(h->vl,
714 0
                        "Create listen socket failed: %s", err);
715 10
        assert(closed_sock > 0);
716 10
        sua = VSA_getsockname(closed_sock, vsabuf, sizeof vsabuf);
717 10
        AN(sua);
718 10
        VTCP_name(sua, addr, sizeof addr, port, sizeof port);
719 10
        if (VSA_Get_Proto(sua) == AF_INET)
720 10
                macro_def(h->vl, h->closed_sock, "sock", "%s:%s", addr, port);
721
        else
722 0
                macro_def(h->vl, h->closed_sock, "sock", "[%s]:%s", addr, port);
723 10
        macro_def(h->vl, h->closed_sock, "addr", "%s", addr);
724 10
        macro_def(h->vl, h->closed_sock, "port", "%s", port);
725 10
        VTCP_close(&closed_sock);
726
727 10
        h->cli = haproxy_cli_new(h);
728 10
        AN(h->cli);
729
730 10
        h->mcli = haproxy_mcli_new(h);
731 10
        AN(h->mcli);
732
733 10
        bprintf(buf, "rm -rf \"%s\" ; mkdir -p \"%s\"", h->workdir, h->workdir);
734 10
        AZ(system(buf));
735
736 10
        h->sd_sock = -1;
737
738 10
        VTAILQ_INIT(&h->envars);
739 10
        VTAILQ_INSERT_TAIL(&haproxies, h, list);
740
741 10
        return (h);
742 10
}
743
744
/**********************************************************************
745
 * Delete a haproxy instance
746
 */
747
748
static void
749 10
haproxy_delete(struct haproxy *h)
750
{
751
        char buf[PATH_MAX];
752
753 10
        CHECK_OBJ_NOTNULL(h, HAPROXY_MAGIC);
754 10
        vtc_logclose(h->vl);
755
756 10
        if (!leave_temp) {
757 10
                bprintf(buf, "rm -rf \"%s\"", h->workdir);
758 10
                AZ(system(buf));
759 10
        }
760
761 20
        if (h->sd_sock >= 0)
762 0
                closefd(&h->sd_sock);
763
764 10
        free(h->name);
765 10
        free(h->workdir);
766 10
        free(h->cli_fn);
767 10
        free(h->cfg_fn);
768 10
        free(h->pid_fn);
769 10
        VSB_destroy(&h->args);
770 10
        haproxy_cli_delete(h->cli);
771 10
        haproxy_cli_delete(h->mcli);
772
773
        /* XXX: MEMLEAK (?) */
774 10
        FREE_OBJ(h);
775 10
}
776
777
/**********************************************************************
778
 * HAProxy listener
779
 */
780
781
static void *
782 10
haproxy_thread(void *priv)
783
{
784
        struct haproxy *h;
785
786 10
        CAST_OBJ_NOTNULL(h, priv, HAPROXY_MAGIC);
787 10
        (void)vtc_record(h->vl, h->fds[0], h->msgs);
788 10
        h->its_dead_jim = 1;
789 10
        return (NULL);
790
}
791
792
793
/**********************************************************************
794
 * Start a HAProxy instance.
795
 */
796
797
static void
798 10
haproxy_start(struct haproxy *h)
799
{
800
        char buf[PATH_MAX];
801
        struct vsb *vsb;
802
803 10
        vtc_log(h->vl, 2, "%s", __func__);
804
805 10
        AZ(VSB_finish(h->args));
806 20
        vtc_log(h->vl, 4, "opt_worker %d opt_daemon %d opt_check_mode %d opt_mcli %d",
807 10
            h->opt_worker, h->opt_daemon, h->opt_check_mode, h->opt_mcli);
808
809 10
        vsb = VSB_new_auto();
810 10
        AN(vsb);
811
812 10
        VSB_printf(vsb, "exec \"%s\"", h->filename);
813 10
        if (h->opt_check_mode)
814 2
                VSB_cat(vsb, " -c");
815 8
        else if (h->opt_daemon)
816 3
                VSB_cat(vsb, " -D");
817
        else
818 5
                VSB_cat(vsb, " -d");
819
820 10
        if (h->opt_worker) {
821 0
                if (h->opt_worker == 2) { /* sd_notify mode */
822 0
                        VSB_cat(vsb, " -Ws");
823 0
                        haproxy_bind_sdnotify(h);
824 0
                } else {
825 0
                        VSB_cat(vsb, " -W");
826
                }
827 0
                if (h->opt_mcli) {
828
                        int sock;
829 0
                        sock = haproxy_create_mcli(h);
830 0
                        VSB_printf(vsb, " -S \"fd@%d\"", sock);
831 0
                }
832 0
        }
833
834 10
        VSB_printf(vsb, " %s", VSB_data(h->args));
835
836 10
        VSB_printf(vsb, " -f \"%s\" ", h->cfg_fn);
837
838 10
        if (h->opt_worker || h->opt_daemon) {
839 3
                bprintf(buf, "%s/pid", h->workdir);
840 3
                h->pid_fn = strdup(buf);
841 3
                AN(h->pid_fn);
842 3
                VSB_printf(vsb, " -p \"%s\"", h->pid_fn);
843 3
        }
844
845 10
        AZ(VSB_finish(vsb));
846 10
        vtc_dump(h->vl, 4, "argv", VSB_data(vsb), -1);
847
848 10
        if (h->opt_worker && !h->opt_daemon) {
849
                /*
850
                 * HAProxy master process must exit with status 128 + <signum>
851
                 * if signaled by <signum> signal.
852
                 */
853 0
                h->expect_exit = HAPROXY_EXPECT_EXIT;
854 0
        }
855
856 10
        haproxy_write_conf(h);
857
858 10
        AZ(pipe(&h->fds[0]));
859 10
        vtc_log(h->vl, 4, "XXX %d @%d", h->fds[1], __LINE__);
860 10
        AZ(pipe(&h->fds[2]));
861 10
        h->pid = h->ppid = fork();
862 10
        assert(h->pid >= 0);
863 20
        if (h->pid == 0) {
864 10
                haproxy_build_env(h);
865 10
                haproxy_delete_envars(h);
866 10
                AZ(chdir(h->name));
867 10
                AZ(dup2(h->fds[0], 0));
868 10
                assert(dup2(h->fds[3], 1) == 1);
869 10
                assert(dup2(1, 2) == 2);
870 10
                closefd(&h->fds[0]);
871 10
                closefd(&h->fds[1]);
872 10
                closefd(&h->fds[2]);
873 10
                closefd(&h->fds[3]);
874 10
                AZ(execl("/bin/sh", "/bin/sh", "-c", VSB_data(vsb), (char*)0));
875 0
                exit(1);
876
        }
877 10
        VSB_destroy(&vsb);
878
879 10
        vtc_log(h->vl, 3, "PID: %ld", (long)h->pid);
880 10
        macro_def(h->vl, h->name, "pid", "%ld", (long)h->pid);
881 10
        macro_def(h->vl, h->name, "name", "%s", h->workdir);
882
883 10
        closefd(&h->fds[0]);
884 10
        closefd(&h->fds[3]);
885 10
        h->fds[0] = h->fds[2];
886 10
        h->fds[2] = h->fds[3] = -1;
887
888 10
        PTOK(pthread_create(&h->tp, NULL, haproxy_thread, h));
889
890 10
        if (h->pid_fn != NULL)
891 3
                haproxy_wait_pidfile(h);
892
893 6
        if (h->opt_worker == 2) /* sd_notify mode */
894 0
                haproxy_wait_sdnotify_ready(h);
895 10
}
896
897
898
/**********************************************************************
899
 * Wait for a HAProxy instance.
900
 */
901
902
static void
903 10
haproxy_wait(struct haproxy *h)
904
{
905
        void *p;
906
        int i, n, sig;
907
908 10
        vtc_log(h->vl, 2, "Wait");
909
910 10
        if (h->pid < 0)
911 0
                haproxy_start(h);
912
913 0
        if (h->cli->spec)
914 0
                haproxy_cli_run(h->cli);
915
916 0
        if (h->mcli->spec)
917 0
                haproxy_cli_run(h->mcli);
918
919 10
        closefd(&h->fds[1]);
920
921 10
        sig = SIGINT;
922 10
        n = 0;
923 10
        vtc_log(h->vl, 2, "Stop HAproxy pid=%ld", (long)h->pid);
924 75
        while (h->opt_daemon || (!h->opt_check_mode && !h->its_dead_jim)) {
925 68
                assert(h->pid > 0);
926 68
                if (n == 0) {
927 11
                        i = kill(h->pid, sig);
928 11
                        if (i == 0)
929 8
                                h->expect_signal = -sig;
930 13
                        if (i && errno == ESRCH)
931 3
                                break;
932 16
                        vtc_log(h->vl, 4,
933 8
                            "Kill(%d)=%d: %s", sig, i, strerror(errno));
934 8
                }
935 13
                VTIM_sleep(0.1);
936 13
                if (++n == 20) {
937 3
                        switch (sig) {
938 3
                        case SIGINT:    sig = SIGTERM ; break;
939 0
                        case SIGTERM:   sig = SIGKILL ; break;
940 0
                        default:        break;
941
                        }
942 3
                        n = 0;
943 3
                }
944
        }
945
946 10
        PTOK(pthread_join(h->tp, &p));
947 10
        AZ(p);
948 10
        closefd(&h->fds[0]);
949 10
        if (!h->opt_daemon) {
950 7
                vtc_wait4(h->vl, h->ppid, h->expect_exit, h->expect_signal, 0);
951 7
                h->ppid = -1;
952 7
        }
953 10
        h->pid = -1;
954 10
}
955
956
#define HAPROXY_BE_FD_STR     "fd@${"
957
#define HAPROXY_BE_FD_STRLEN  strlen(HAPROXY_BE_FD_STR)
958
959
static int
960 10
haproxy_build_backends(struct haproxy *h, const char *vsb_data)
961
{
962
        char *s, *p, *q;
963
964 10
        s = strdup(vsb_data);
965 10
        if (!s)
966 0
                return (-1);
967
968 10
        p = s;
969 27
        while (1) {
970
                int sock;
971
                char buf[128], addr[128], port[128];
972
                const char *err;
973 27
                char vsabuf[vsa_suckaddr_len];
974
                const struct suckaddr *sua;
975
976 27
                p = strstr(p, HAPROXY_BE_FD_STR);
977 27
                if (!p)
978 10
                        break;
979
980 17
                q = p += HAPROXY_BE_FD_STRLEN;
981 70
                while (*q && *q != '}')
982 53
                        q++;
983 17
                if (*q != '}')
984 0
                        break;
985
986 17
                *q++ = '\0';
987 17
                sock = VTCP_listen_on("127.0.0.1:0", NULL, 100, &err);
988 17
                if (err != NULL)
989 0
                        vtc_fatal(h->vl,
990 0
                            "Create listen socket failed: %s", err);
991 17
                assert(sock > 0);
992 17
                sua = VSA_getsockname(sock, vsabuf, sizeof vsabuf);
993 17
                AN(sua);
994
995 17
                VTCP_name(sua, addr, sizeof addr, port, sizeof port);
996 17
                bprintf(buf, "%s_%s", h->name, p);
997 17
                if (VSA_Get_Proto(sua) == AF_INET)
998 17
                        macro_def(h->vl, buf, "sock", "%s:%s", addr, port);
999
                else
1000 0
                        macro_def(h->vl, buf, "sock", "[%s]:%s", addr, port);
1001 17
                macro_def(h->vl, buf, "addr", "%s", addr);
1002 17
                macro_def(h->vl, buf, "port", "%s", port);
1003
1004 17
                bprintf(buf, "%d", sock);
1005 17
                vtc_log(h->vl, 4, "setenv(%s, %s)", p, buf);
1006 17
                haproxy_add_envar(h, p, buf);
1007 17
                p = q;
1008 27
        }
1009 10
        free(s);
1010 10
        return (0);
1011 10
}
1012
1013
static void
1014 2
haproxy_check_conf(struct haproxy *h, const char *expect)
1015
{
1016
1017 2
        h->msgs = VSB_new_auto();
1018 2
        AN(h->msgs);
1019 2
        h->opt_check_mode = 1;
1020 2
        haproxy_start(h);
1021 2
        haproxy_wait(h);
1022 2
        AZ(VSB_finish(h->msgs));
1023 2
        if (strstr(VSB_data(h->msgs), expect) == NULL)
1024 0
                vtc_fatal(h->vl, "Did not find expected string '%s'", expect);
1025 2
        vtc_log(h->vl, 2, "Found expected '%s'", expect);
1026 2
        VSB_destroy(&h->msgs);
1027 2
}
1028
1029
/**********************************************************************
1030
 * Write a configuration for <h> HAProxy instance.
1031
 */
1032
1033
static void
1034 10
haproxy_store_conf(struct haproxy *h, const char *cfg, int auto_be)
1035
{
1036
        struct vsb *vsb, *vsb2;
1037
1038 10
        vsb = VSB_new_auto();
1039 10
        AN(vsb);
1040
1041 10
        vsb2 = VSB_new_auto();
1042 10
        AN(vsb2);
1043
1044 20
        VSB_printf(vsb, "    global\n\tstats socket \"%s\" "
1045 10
                   "level admin mode 600\n", h->cli_fn);
1046 10
        VSB_cat(vsb, "    stats socket \"fd@${cli}\" level admin\n");
1047 10
        AZ(VSB_cat(vsb, cfg));
1048
1049 10
        if (auto_be)
1050 1
                cmd_server_gen_haproxy_conf(vsb);
1051
1052 10
        AZ(VSB_finish(vsb));
1053
1054 10
        AZ(haproxy_build_backends(h, VSB_data(vsb)));
1055
1056 10
        h->cfg_vsb = macro_expand(h->vl, VSB_data(vsb));
1057 10
        AN(h->cfg_vsb);
1058
1059 10
        VSB_destroy(&vsb2);
1060 10
        VSB_destroy(&vsb);
1061 10
}
1062
1063
static void
1064 10
haproxy_write_conf(struct haproxy *h)
1065
{
1066
        struct vsb *vsb;
1067
1068 10
        vsb = macro_expand(h->vl, VSB_data(h->cfg_vsb));
1069 10
        AN(vsb);
1070 10
        assert(VSB_len(vsb) >= 0);
1071
1072 10
        vtc_dump(h->vl, 4, "conf", VSB_data(vsb), VSB_len(vsb));
1073 30
        if (VFIL_writefile(h->workdir, h->cfg_fn,
1074 20
            VSB_data(vsb), VSB_len(vsb)) != 0)
1075 0
                vtc_fatal(h->vl,
1076
                    "failed to write haproxy configuration file: %s (%d)",
1077 0
                    strerror(errno), errno);
1078
1079 10
        VSB_destroy(&vsb);
1080 10
}
1081
1082
/* SECTION: haproxy haproxy
1083
 *
1084
 * Define and interact with haproxy instances.
1085
 *
1086
 * To define a haproxy server, you'll use this syntax::
1087
 *
1088
 *      haproxy hNAME -conf-OK CONFIG
1089
 *      haproxy hNAME -conf-BAD ERROR CONFIG
1090
 *      haproxy hNAME [-D] [-W] [-arg STRING] [-conf[+vcl] STRING]
1091
 *
1092
 * The first ``haproxy hNAME`` invocation will start the haproxy master
1093
 * process in the background, waiting for the ``-start`` switch to actually
1094
 * start the child.
1095
 *
1096
 * Arguments:
1097
 *
1098
 * hNAME
1099
 *         Identify the HAProxy server with a string, it must starts with 'h'.
1100
 *
1101
 * \-conf-OK CONFIG
1102
 *         Run haproxy in '-c' mode to check config is OK
1103
 *         stdout/stderr should contain 'Configuration file is valid'
1104
 *         The exit code should be 0.
1105
 *
1106
 * \-conf-BAD ERROR CONFIG
1107
 *         Run haproxy in '-c' mode to check config is BAD.
1108
 *         "ERROR" should be part of the diagnostics on stdout/stderr.
1109
 *         The exit code should be 1.
1110
 *
1111
 * \-D
1112
 *         Run HAproxy in daemon mode.  If not given '-d' mode used.
1113
 *
1114
 * \-W
1115
 *         Enable HAproxy in Worker mode.
1116
 *
1117
 * \-S
1118
 *         Enable HAproxy Master CLI in Worker mode
1119
 *
1120
 * \-arg STRING
1121
 *         Pass an argument to haproxy, for example "-h simple_list".
1122
 *
1123
 * \-cli STRING
1124
 *         Specify the spec to be run by the command line interface (CLI).
1125
 *
1126
 * \-mcli STRING
1127
 *         Specify the spec to be run by the command line interface (CLI)
1128
 *         of the Master process.
1129
 *
1130
 * \-conf STRING
1131
 *         Specify the configuration to be loaded by this HAProxy instance.
1132
 *
1133
 * \-conf+backend STRING
1134
 *         Specify the configuration to be loaded by this HAProxy instance,
1135
 *         all server instances will be automatically appended
1136
 *
1137
 * \-start
1138
 *         Start this HAProxy instance.
1139
 *
1140
 * \-wait
1141
 *         Stop this HAProxy instance.
1142
 *
1143
 * \-expectexit NUMBER
1144
 *         Expect haproxy to exit(3) with this value
1145
 *
1146
 */
1147
1148
void
1149 1022
cmd_haproxy(CMD_ARGS)
1150
{
1151
        struct haproxy *h, *h2;
1152
1153 1022
        (void)priv;
1154
1155 1022
        if (av == NULL) {
1156
                /* Reset and free */
1157 1021
                VTAILQ_FOREACH_SAFE(h, &haproxies, list, h2) {
1158 20
                        vtc_log(h->vl, 2,
1159
                            "Reset and free %s haproxy %ld",
1160 10
                            h->name, (long)h->pid);
1161 10
                        if (h->pid >= 0)
1162 7
                                haproxy_wait(h);
1163 10
                        VTAILQ_REMOVE(&haproxies, h, list);
1164 10
                        haproxy_delete(h);
1165 10
                }
1166 1011
                return;
1167
        }
1168
1169 11
        AZ(strcmp(av[0], "haproxy"));
1170 11
        av++;
1171
1172 11
        VTC_CHECK_NAME(vl, av[0], "haproxy", 'h');
1173 13
        VTAILQ_FOREACH(h, &haproxies, list)
1174 3
                if (!strcmp(h->name, av[0]))
1175 1
                        break;
1176 10
        if (h == NULL)
1177 10
                h = haproxy_new(av[0]);
1178 11
        av++;
1179
1180 34
        for (; *av != NULL; av++) {
1181 23
                if (vtc_error)
1182 0
                        break;
1183
1184 23
                if (!strcmp(*av, "-conf-OK")) {
1185 1
                        AN(av[1]);
1186 1
                        haproxy_store_conf(h, av[1], 0);
1187 1
                        h->expect_exit = 0;
1188 1
                        haproxy_check_conf(h, "");
1189 1
                        av++;
1190 1
                        continue;
1191
                }
1192 22
                if (!strcmp(*av, "-conf-BAD")) {
1193 1
                        AN(av[1]);
1194 1
                        AN(av[2]);
1195 1
                        haproxy_store_conf(h, av[2], 0);
1196 1
                        h->expect_exit = 1;
1197 1
                        haproxy_check_conf(h, av[1]);
1198 1
                        av += 2;
1199 1
                        continue;
1200
                }
1201
1202 21
                if (!strcmp(*av, HAPROXY_OPT_DAEMON)) {
1203 3
                        h->opt_daemon = 1;
1204 3
                        continue;
1205
                }
1206 18
                if (!strcmp(*av, HAPROXY_OPT_WORKER)) {
1207 0
                        h->opt_worker = 1;
1208 0
                        continue;
1209
                }
1210 18
                if (!strcmp(*av, HAPROXY_OPT_SD_WORKER)) {
1211 0
                        h->opt_worker = 2;
1212 0
                        continue;
1213
                }
1214 18
                if (!strcmp(*av, HAPROXY_OPT_MCLI)) {
1215 0
                        h->opt_mcli = 1;
1216 0
                        continue;
1217
                }
1218 18
                if (!strcmp(*av, "-arg")) {
1219 0
                        AN(av[1]);
1220 0
                        AZ(h->pid);
1221 0
                        VSB_cat(h->args, " ");
1222 0
                        VSB_cat(h->args, av[1]);
1223 0
                        av++;
1224 0
                        continue;
1225
                }
1226
1227 18
                if (!strcmp(*av, "-cli")) {
1228 1
                        REPLACE(h->cli->spec, av[1]);
1229 1
                        if (h->tp)
1230 1
                                haproxy_cli_run(h->cli);
1231 1
                        av++;
1232 1
                        continue;
1233
                }
1234
1235 17
                if (!strcmp(*av, "-mcli")) {
1236 0
                        REPLACE(h->mcli->spec, av[1]);
1237 0
                        if (h->tp)
1238 0
                                haproxy_cli_run(h->mcli);
1239 0
                        av++;
1240 0
                        continue;
1241
                }
1242
1243 17
                if (!strcmp(*av, "-conf")) {
1244 7
                        AN(av[1]);
1245 7
                        haproxy_store_conf(h, av[1], 0);
1246 7
                        av++;
1247 7
                        continue;
1248
                }
1249 10
                if (!strcmp(*av, "-conf+backend")) {
1250 1
                        AN(av[1]);
1251 1
                        haproxy_store_conf(h, av[1], 1);
1252 1
                        av++;
1253 1
                        continue;
1254
                }
1255
1256 9
                if (!strcmp(*av, "-expectexit")) {
1257 0
                        h->expect_exit = strtoul(av[1], NULL, 0);
1258 0
                        av++;
1259 0
                        continue;
1260
                }
1261 9
                if (!strcmp(*av, "-start")) {
1262 8
                        haproxy_start(h);
1263 8
                        continue;
1264
                }
1265 1
                if (!strcmp(*av, "-wait")) {
1266 1
                        haproxy_wait(h);
1267 1
                        continue;
1268
                }
1269 0
                vtc_fatal(h->vl, "Unknown haproxy argument: %s", *av);
1270
        }
1271 1022
}