varnish-cache/bin/varnishtest/vtest2/src/vtc_haproxy.c
0
/*-
1
 * Copyright (c) 2008-2018 Varnish Software AS
2
 * All rights reserved.
3
 *
4
 * Author: Frédéric Lécaille <flecaille@haproxy.com>
5
 *
6
 * SPDX-License-Identifier: BSD-2-Clause
7
 *
8
 * Redistribution and use in source and binary forms, with or without
9
 * modification, are permitted provided that the following conditions
10
 * are met:
11
 * 1. Redistributions of source code must retain the above copyright
12
 *    notice, this list of conditions and the following disclaimer.
13
 * 2. Redistributions in binary form must reproduce the above copyright
14
 *    notice, this list of conditions and the following disclaimer in the
15
 *    documentation and/or other materials provided with the distribution.
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20
 * ARE DISCLAIMED.  IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE
21
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27
 * SUCH DAMAGE.
28
 */
29
30
#include "config.h"
31
32
#include <inttypes.h>
33
#include <poll.h>
34
#include <stdio.h>
35
#include <stdlib.h>
36
#include <string.h>
37
#include <sys/stat.h> /* for MUSL (mode_t) */
38
#include <sys/types.h>
39
#include <sys/socket.h>
40
#include <sys/un.h>
41
#include <unistd.h>
42
43
#include "vtc.h"
44
45
#include "vfil.h"
46
#include "vpf.h"
47
#include "vre.h"
48
#include "vtcp.h"
49
#include "vsa.h"
50
#include "vtim.h"
51
52
#define HAPROXY_PROGRAM_ENV_VAR "HAPROXY_PROGRAM"
53
#define HAPROXY_ARGS_ENV_VAR    "HAPROXY_ARGS"
54
#define HAPROXY_OPT_WORKER      "-W"
55
#define HAPROXY_OPT_SD_WORKER   "-Ws"
56
#define HAPROXY_OPT_MCLI        "-S"
57
#define HAPROXY_OPT_DAEMON      "-D"
58
#define HAPROXY_SIGNAL          SIGINT
59
#define HAPROXY_EXPECT_EXIT     (128 + HAPROXY_SIGNAL)
60
61
struct envar {
62
        VTAILQ_ENTRY(envar) list;
63
        char *name;
64
        char *value;
65
};
66
67
struct haproxy {
68
        unsigned                magic;
69
#define HAPROXY_MAGIC           0x8a45cf75
70
        char                    *name;
71
        struct vtclog           *vl;
72
        VTAILQ_ENTRY(haproxy)   list;
73
74
        const char              *filename;
75
        struct vsb              *args;
76
        int                     opt_worker;
77
        int                     opt_mcli;
78
        int                     opt_daemon;
79
        int                     opt_check_mode;
80
        char                    *pid_fn;
81
        pid_t                   pid;
82
        pid_t                   ppid;
83
        int                     fds[4];
84
        char                    *cfg_fn;
85
        struct vsb              *cfg_vsb;
86
87
        pthread_t               tp;
88
        int                     expect_exit;
89
        int                     expect_signal;
90
        int                     its_dead_jim;
91
92
        /* sd_notify unix socket */
93
        struct sockaddr_un      sd_uds;
94
        int                     sd_sock;
95
96
        /* UNIX socket CLI. */
97
        char                    *cli_fn;
98
        /* TCP socket CLI. */
99
        struct haproxy_cli *cli;
100
101
        /* master CLI */
102
        struct haproxy_cli *mcli;
103
104
        char                    *workdir;
105
        struct vsb              *msgs;
106
        char                    closed_sock[256]; /* Closed TCP socket */
107
        VTAILQ_HEAD(,envar) envars;
108
};
109
110
static VTAILQ_HEAD(, haproxy)   haproxies =
111
    VTAILQ_HEAD_INITIALIZER(haproxies);
112
113
struct haproxy_cli {
114
        unsigned                magic;
115
#define HAPROXY_CLI_MAGIC       0xb09a4ed8
116
        struct vtclog           *vl;
117
        char                    running;
118
119
        char                    *spec;
120
121
        int                     sock;
122
        char                    connect[256];
123
124
        pthread_t               tp;
125
        size_t                  txbuf_sz;
126
        char                    *txbuf;
127
        size_t                  rxbuf_sz;
128
        char                    *rxbuf;
129
130
        vtim_dur                timeout;
131
};
132
133
static void haproxy_write_conf(struct haproxy *h);
134
135
static void
136 760
haproxy_add_envar(struct haproxy *h,
137
                  const char *name, const char *value)
138
{
139
        struct envar *e;
140
141 760
        e = malloc(sizeof *e);
142 760
        AN(e);
143 760
        e->name = strdup(name);
144 760
        e->value = strdup(value);
145 760
        AN(e->name);
146 760
        AN(e->value);
147 760
        VTAILQ_INSERT_TAIL(&h->envars, e, list);
148 760
}
149
150
static void
151 440
haproxy_delete_envars(struct haproxy *h)
152
{
153
        struct envar *e, *e2;
154 1200
        VTAILQ_FOREACH_SAFE(e, &h->envars, list, e2) {
155 760
                VTAILQ_REMOVE(&h->envars, e, list);
156 760
                free(e->name);
157 760
                free(e->value);
158 760
                free(e);
159 760
        }
160 440
}
161
162
static void
163 440
haproxy_build_env(const struct haproxy *h)
164
{
165
        struct envar *e;
166
167 1200
        VTAILQ_FOREACH(e, &h->envars, list) {
168 760
                if (setenv(e->name, e->value, 0) == -1)
169 0
                        vtc_fatal(h->vl, "setenv() failed: %s (%d)",
170 0
                                  strerror(errno), errno);
171 760
        }
172 440
}
173
174
/**********************************************************************
175
 * Socket connect (same as client_tcp_connect()).
176
 */
177
178
static int
179 80
haproxy_cli_tcp_connect(struct vtclog *vl, const char *addr, vtim_dur tmo,
180
    const char **errp)
181
{
182
        int fd;
183
        char mabuf[VTCP_ADDRBUFSIZE], mpbuf[VTCP_PORTBUFSIZE];
184
185 80
        AN(addr);
186 80
        AN(errp);
187 80
        fd = VTCP_open(addr, NULL, tmo, errp);
188 80
        if (fd < 0)
189 0
                return (fd);
190 80
        VTCP_myname(fd, mabuf, sizeof mabuf, mpbuf, sizeof mpbuf);
191 160
        vtc_log(vl, 3,
192 80
            "CLI connected fd %d from %s %s to %s", fd, mabuf, mpbuf, addr);
193 80
        return (fd);
194 80
}
195
196
/*
197
 * SECTION: haproxy.cli haproxy CLI Specification
198
 * SECTION: haproxy.cli.send
199
 * send STRING
200
 *         Push STRING on the CLI connection. STRING will be terminated by an
201
 *         end of line character (\n).
202
 */
203
static void v_matchproto_(cmd_f)
204 80
cmd_haproxy_cli_send(CMD_ARGS)
205
{
206
        struct vsb *vsb;
207
        struct haproxy_cli *hc;
208
        int j;
209
210 80
        (void)vl;
211 80
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
212 80
        AZ(strcmp(av[0], "send"));
213 80
        AN(av[1]);
214 80
        AZ(av[2]);
215
216 80
        vsb = VSB_new_auto();
217 80
        AN(vsb);
218 80
        AZ(VSB_cat(vsb, av[1]));
219 80
        AZ(VSB_cat(vsb, "\n"));
220 80
        AZ(VSB_finish(vsb));
221 80
        if (hc->sock == -1) {
222
                int fd;
223
                const char *err;
224
                struct vsb *vsb_connect;
225
226 0
                vsb_connect = macro_expand(hc->vl, hc->connect);
227 0
                AN(vsb_connect);
228 0
                fd = haproxy_cli_tcp_connect(hc->vl,
229 0
                    VSB_data(vsb_connect), 10., &err);
230 0
                if (fd < 0)
231 0
                        vtc_fatal(hc->vl,
232 0
                            "CLI failed to open %s: %s", VSB_data(vsb), err);
233 0
                VSB_destroy(&vsb_connect);
234 0
                hc->sock = fd;
235 0
        }
236 80
        vtc_dump(hc->vl, 4, "CLI send", VSB_data(vsb), -1);
237
238 80
        if (VSB_tofile(vsb, hc->sock))
239 0
                vtc_fatal(hc->vl,
240 0
                    "CLI fd %d send error %s", hc->sock, strerror(errno));
241
242
        /* a CLI command must be followed by a SHUT_WR if we want HAProxy to
243
         * close after the response */
244 80
        j = shutdown(hc->sock, SHUT_WR);
245 80
        vtc_log(hc->vl, 3, "CLI shutting fd %d", hc->sock);
246 80
        if (!VTCP_Check(j))
247 0
                vtc_fatal(hc->vl, "Shutdown failed: %s", strerror(errno));
248
249 80
        VSB_destroy(&vsb);
250 80
}
251
252
#define HAPROXY_CLI_RECV_LEN (1 << 14)
253
static void
254 80
haproxy_cli_recv(struct haproxy_cli *hc)
255
{
256
        ssize_t ret;
257
        size_t rdz, left, off;
258
259 80
        rdz = ret = off = 0;
260
        /* We want to null terminate this buffer. */
261 80
        left = hc->rxbuf_sz - 1;
262 160
        while (!vtc_error && left > 0) {
263 160
                VTCP_set_read_timeout(hc->sock, hc->timeout);
264
265 160
                ret = recv(hc->sock, hc->rxbuf + off, HAPROXY_CLI_RECV_LEN, 0);
266 160
                if (ret < 0) {
267 0
                        if (errno == EINTR || errno == EAGAIN)
268 0
                                continue;
269
270 0
                        vtc_fatal(hc->vl,
271
                            "CLI fd %d recv() failed (%s)",
272 0
                            hc->sock, strerror(errno));
273
                }
274
                /* Connection closed. */
275 160
                if (ret == 0) {
276 80
                        if (rdz > 0 && hc->rxbuf[rdz - 1] != '\n')
277 0
                                vtc_fatal(hc->vl,
278
                                    "CLI rx timeout (fd: %d %.3fs ret: %zd)",
279 0
                                    hc->sock, hc->timeout, ret);
280
281 80
                        vtc_log(hc->vl, 4, "CLI connection normally closed");
282 80
                        vtc_log(hc->vl, 3, "CLI closing fd %d", hc->sock);
283 80
                        VTCP_close(&hc->sock);
284 80
                        break;
285
                }
286
287 80
                rdz += ret;
288 80
                left -= ret;
289 80
                off  += ret;
290
        }
291 80
        hc->rxbuf[rdz] = '\0';
292 80
        vtc_dump(hc->vl, 4, "CLI recv", hc->rxbuf, rdz);
293 80
}
294
295
/*
296
 * SECTION: haproxy.cli.expect
297
 * expect OP STRING
298
 *         Regex match the CLI reception buffer with STRING
299
 *         if OP is ~ or, on the contrary, if OP is !~ check that there is
300
 *         no regex match.
301
 */
302
static void v_matchproto_(cmd_f)
303 80
cmd_haproxy_cli_expect(CMD_ARGS)
304
{
305
        struct haproxy_cli *hc;
306
        struct vsb vsb[1];
307
        vre_t *vre;
308
        int error, erroroffset, i, ret;
309
        char *cmp, *spec, errbuf[VRE_ERROR_LEN];
310
311 80
        (void)vl;
312 80
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
313 80
        AZ(strcmp(av[0], "expect"));
314 80
        av++;
315
316 80
        cmp = av[0];
317 80
        spec = av[1];
318 80
        AN(cmp);
319 80
        AN(spec);
320 80
        AZ(av[2]);
321
322 80
        assert(!strcmp(cmp, "~") || !strcmp(cmp, "!~"));
323
324 80
        haproxy_cli_recv(hc);
325
326 80
        vre = VRE_compile(spec, 0, &error, &erroroffset, 1);
327 80
        if (vre == NULL) {
328 0
                AN(VSB_init(vsb, errbuf, sizeof errbuf));
329 0
                AZ(VRE_error(vsb, error));
330 0
                AZ(VSB_finish(vsb));
331 0
                VSB_fini(vsb);
332 0
                vtc_fatal(hc->vl, "CLI regexp error: '%s' (@%d) (%s)",
333 0
                    errbuf, erroroffset, spec);
334
        }
335
336 80
        i = VRE_match(vre, hc->rxbuf, 0, 0, NULL);
337
338 80
        VRE_free(&vre);
339
340 80
        ret = (i >= 0 && *cmp == '~') || (i < 0 && *cmp == '!');
341 80
        if (!ret)
342 0
                vtc_fatal(hc->vl, "CLI expect failed %s \"%s\"", cmp, spec);
343
        else
344 80
                vtc_log(hc->vl, 4, "CLI expect match %s \"%s\"", cmp, spec);
345 80
}
346
347
static const struct cmds haproxy_cli_cmds[] = {
348
#define CMD_HAPROXY_CLI(n) { #n, cmd_haproxy_cli_##n },
349
        CMD_HAPROXY_CLI(send)
350
        CMD_HAPROXY_CLI(expect)
351
#undef CMD_HAPROXY_CLI
352
        { NULL, NULL }
353
};
354
355
/**********************************************************************
356
 * HAProxy CLI client thread
357
 */
358
359
static void *
360 80
haproxy_cli_thread(void *priv)
361
{
362
        struct haproxy_cli *hc;
363
        struct vsb *vsb;
364
        int fd;
365
        const char *err;
366
367 80
        CAST_OBJ_NOTNULL(hc, priv, HAPROXY_CLI_MAGIC);
368 80
        AN(*hc->connect);
369
370 80
        vsb = macro_expand(hc->vl, hc->connect);
371 80
        AN(vsb);
372
373 80
        fd = haproxy_cli_tcp_connect(hc->vl, VSB_data(vsb), 10., &err);
374 80
        if (fd < 0)
375 0
                vtc_fatal(hc->vl,
376 0
                    "CLI failed to open %s: %s", VSB_data(vsb), err);
377 80
        VTCP_blocking(fd);
378 80
        hc->sock = fd;
379 80
        parse_string(hc->vl, hc, hc->spec);
380 80
        vtc_log(hc->vl, 2, "CLI ending");
381 80
        VSB_destroy(&vsb);
382 80
        return (NULL);
383
}
384
385
/**********************************************************************
386
 * Wait for the CLI client thread to stop
387
 */
388
389
static void
390 80
haproxy_cli_wait(struct haproxy_cli *hc)
391
{
392
        void *res;
393
394 80
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
395 80
        vtc_log(hc->vl, 2, "CLI waiting");
396 80
        PTOK(pthread_join(hc->tp, &res));
397 80
        if (res != NULL)
398 0
                vtc_fatal(hc->vl, "CLI returned \"%s\"", (char *)res);
399 80
        REPLACE(hc->spec, NULL);
400 80
        hc->tp = 0;
401 80
        hc->running = 0;
402 80
}
403
404
/**********************************************************************
405
 * Start the CLI client thread
406
 */
407
408
static void
409 80
haproxy_cli_start(struct haproxy_cli *hc)
410
{
411 80
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
412 80
        vtc_log(hc->vl, 2, "CLI starting");
413 80
        PTOK(pthread_create(&hc->tp, NULL, haproxy_cli_thread, hc));
414 80
        hc->running = 1;
415
416 80
}
417
418
/**********************************************************************
419
 * Run the CLI client thread
420
 */
421
422
static void
423 80
haproxy_cli_run(struct haproxy_cli *hc)
424
{
425 80
        haproxy_cli_start(hc);
426 80
        haproxy_cli_wait(hc);
427 80
}
428
429
/**********************************************************************
430
 * Wait for the pidfile
431
 */
432
433
static void
434 160
haproxy_wait_pidfile(struct haproxy *h)
435
{
436 160
        char buf_err[1024] = {0};
437 160
        int usleep_time = 1000;
438
        double t0;
439
        pid_t pid;
440
441 160
        vtc_log(h->vl, 3, "wait-pid-file");
442 5533
        for (t0 = VTIM_mono(); VTIM_mono() - t0 < 3;) {
443 5533
                if (vtc_error)
444 0
                        return;
445
446 5533
                if (VPF_Read(h->pid_fn, &pid) != 0) {
447 5373
                        bprintf(buf_err,
448
                            "Could not read PID file '%s'", h->pid_fn);
449 5373
                        usleep(usleep_time);
450 5373
                        continue;
451
                }
452
453 160
                if (!h->opt_daemon && pid != h->pid) {
454 0
                        bprintf(buf_err,
455
                            "PID file has different PID (%ld != %lld)",
456
                            (long)pid, (long long)h->pid);
457 0
                        usleep(usleep_time);
458 0
                        continue;
459
                }
460
461 160
                if (kill(pid, 0) < 0) {
462 0
                        bprintf(buf_err,
463
                            "Could not find PID %ld process", (long)pid);
464 0
                        usleep(usleep_time);
465 0
                        continue;
466
                }
467
468 160
                h->pid = pid;
469
470 320
                vtc_log(h->vl, 2, "haproxy PID %ld successfully started",
471 160
                    (long)pid);
472 160
                return;
473
        }
474 0
        vtc_fatal(h->vl, "haproxy %s PID file check failed:\n\t%s\n",
475 0
                  h->name, buf_err);
476 160
}
477
478
/**********************************************************************
479
 * Bind the sd_notify socket
480
 */
481
static void
482 40
haproxy_bind_sdnotify(struct haproxy *h)
483
{
484
        char sd_path[PATH_MAX];
485
        int sd;
486
        int ret;
487 40
        const char *err = NULL;
488 40
        struct sockaddr_un *uds = &h->sd_uds;
489 40
        socklen_t sl = sizeof(*uds);
490
491 40
        bprintf(sd_path, "%s/sd_notify.sock", h->workdir);
492 40
        assert(sd_path[0] == '/');
493
494 40
        if (strlen(sd_path) + 1 > sizeof(uds->sun_path)) {
495 0
                vtc_fatal(h->vl, "Path %s too long for a Unix domain socket", sd_path);
496
        }
497 40
        memset(uds->sun_path, 0, sizeof(uds->sun_path));
498 40
        bprintf(uds->sun_path, "%s", sd_path);
499 40
        uds->sun_family = PF_UNIX;
500
501 40
        sd = socket(AF_UNIX, SOCK_DGRAM, 0);
502 40
        if (sd < 0) {
503 0
                err = "socket(2)";
504 0
                goto error;
505
        }
506
507 40
        if (unlink(uds->sun_path) != 0 && errno != ENOENT) {
508 0
                err = "unlink(2)";
509 0
                closefd(&sd);
510 0
                goto error;
511
        }
512
513 40
        if (bind(sd, (const void*)uds, sl) != 0) {
514 0
                err = "bind(2)";
515 0
                closefd(&sd);
516 0
                goto error;
517
        }
518
519 40
        h->sd_sock = sd;
520
521 40
        assert(h->sd_sock > 0);
522 40
        vtc_log(h->vl, 4, "sd_notify %s", sd_path);
523 40
        ret = setenv("NOTIFY_SOCKET", sd_path, 1);
524 40
        assert(ret == 0);
525
526
error:
527 40
        if (err != NULL)
528 0
                vtc_fatal(h->vl, "Create sd_notify socket failed: %s", err);
529 40
}
530
531
/**********************************************************************
532
 * Wait for the "READY" from sd_notify
533
 */
534
static void
535 40
haproxy_wait_sdnotify_ready(struct haproxy *h)
536
{
537
        struct pollfd fd[1];
538
        char buf[BUFSIZ];
539
        int i, r;
540 40
        char *ready = NULL;
541
542 40
        vtc_log(h->vl, 3, "wait-sdnotify-ready");
543
544
        /* First try to do an accept on h->sd_sock */
545 40
        memset(fd, 0, sizeof(fd));
546 40
        fd[0].fd = h->sd_sock;
547 40
        fd[0].events = POLLIN;
548
549 40
        i = poll(fd, 1, vtc_maxdur * 1000 / 3);
550 40
        vtc_log(h->vl, 4, "sd_notify recv poll %d 0x%x ", i, fd[0].revents);
551 40
        if (i == 0)
552 0
                vtc_fatal(h->vl, "FAIL timeout waiting for sd_notify recv");
553 40
        if (!(fd[0].revents & POLLIN))
554 0
                vtc_fatal(h->vl, "FAIL sd_notify recv wait failure");
555
556 40
        r = recv(h->sd_sock, buf, sizeof(buf) - 1, 0);
557 40
        if (r > 0) {
558 40
                buf[r] = '\0';
559 40
                ready = strstr(buf, "READY=1");
560 40
        }
561
562 40
        if (!ready)
563 0
                vtc_fatal(h->vl, "FAIL sd_notify recv READY failure");
564
        else
565 40
                vtc_log(h->vl, 3, "sd_notify READY=1");
566 40
}
567
/**********************************************************************
568
 * Allocate and initialize a CLI client
569
 */
570
571
static struct haproxy_cli *
572 440
haproxy_cli_new(struct haproxy *h)
573
{
574
        struct haproxy_cli *hc;
575
576 440
        ALLOC_OBJ(hc, HAPROXY_CLI_MAGIC);
577 440
        AN(hc);
578
579 440
        hc->vl = h->vl;
580 440
        vtc_log_set_cmd(hc->vl, haproxy_cli_cmds);
581 440
        hc->sock = -1;
582 440
        bprintf(hc->connect, "${%s_cli_sock}", h->name);
583
584 440
        hc->txbuf_sz = hc->rxbuf_sz = 2048 * 1024;
585 440
        hc->txbuf = malloc(hc->txbuf_sz);
586 440
        AN(hc->txbuf);
587 440
        hc->rxbuf = malloc(hc->rxbuf_sz);
588 440
        AN(hc->rxbuf);
589
590 440
        return (hc);
591
}
592
593
/* creates a master CLI client (-mcli) */
594
static struct haproxy_cli *
595 440
haproxy_mcli_new(struct haproxy *h)
596
{
597
        struct haproxy_cli *hc;
598
599 440
        ALLOC_OBJ(hc, HAPROXY_CLI_MAGIC);
600 440
        AN(hc);
601
602 440
        hc->vl = h->vl;
603 440
        vtc_log_set_cmd(hc->vl, haproxy_cli_cmds);
604 440
        hc->sock = -1;
605 440
        bprintf(hc->connect, "${%s_mcli_sock}", h->name);
606
607 440
        hc->txbuf_sz = hc->rxbuf_sz = 2048 * 1024;
608 440
        hc->txbuf = malloc(hc->txbuf_sz);
609 440
        AN(hc->txbuf);
610 440
        hc->rxbuf = malloc(hc->rxbuf_sz);
611 440
        AN(hc->rxbuf);
612
613 440
        return (hc);
614
}
615
616
/* Bind an address/port for the master CLI (-mcli) */
617
static int
618 40
haproxy_create_mcli(struct haproxy *h)
619
{
620
        int sock;
621
        const char *err;
622
        char buf[128], addr[128], port[128];
623 40
        char vsabuf[vsa_suckaddr_len];
624
        const struct suckaddr *sua;
625
626 40
        sock = VTCP_listen_on(default_listen_addr, NULL, 100, &err);
627 40
        if (err != NULL)
628 0
                vtc_fatal(h->vl,
629 0
                          "Create listen socket failed: %s", err);
630 40
        assert(sock > 0);
631 40
        sua = VSA_getsockname(sock, vsabuf, sizeof vsabuf);
632 40
        AN(sua);
633
634 40
        VTCP_name(sua, addr, sizeof addr, port, sizeof port);
635 40
        bprintf(buf, "%s_mcli", h->name);
636 40
        if (VSA_Get_Proto(sua) == AF_INET)
637 40
                macro_def(h->vl, buf, "sock", "%s:%s", addr, port);
638
        else
639 0
                macro_def(h->vl, buf, "sock", "[%s]:%s", addr, port);
640 40
        macro_def(h->vl, buf, "addr", "%s", addr);
641 40
        macro_def(h->vl, buf, "port", "%s", port);
642
643 40
        return (sock);
644 40
}
645
646
static void
647 880
haproxy_cli_delete(struct haproxy_cli *hc)
648
{
649 880
        CHECK_OBJ_NOTNULL(hc, HAPROXY_CLI_MAGIC);
650 880
        REPLACE(hc->spec, NULL);
651 880
        REPLACE(hc->txbuf, NULL);
652 880
        REPLACE(hc->rxbuf, NULL);
653 880
        FREE_OBJ(hc);
654 880
}
655
656
/**********************************************************************
657
 * Allocate and initialize a haproxy
658
 */
659
660
static struct haproxy *
661 440
haproxy_new(const char *name)
662
{
663
        struct haproxy *h;
664
        struct vsb *vsb;
665
        char buf[PATH_MAX];
666
        int closed_sock;
667
        char addr[128], port[128];
668
        const char *err;
669
        const char *env_args;
670 440
        char vsabuf[vsa_suckaddr_len];
671
        const struct suckaddr *sua;
672
673 440
        ALLOC_OBJ(h, HAPROXY_MAGIC);
674 440
        AN(h);
675 440
        REPLACE(h->name, name);
676
677 440
        h->args = VSB_new_auto();
678 440
        env_args = getenv(HAPROXY_ARGS_ENV_VAR);
679 440
        if (env_args) {
680 0
                VSB_cat(h->args, env_args);
681 0
                VSB_cat(h->args, " ");
682 0
        }
683
684 440
        h->vl = vtc_logopen("%s", name);
685 440
        vtc_log_set_cmd(h->vl, haproxy_cli_cmds);
686 440
        AN(h->vl);
687
688 440
        h->filename = getenv(HAPROXY_PROGRAM_ENV_VAR);
689 440
        if (h->filename == NULL)
690 440
                h->filename = "haproxy";
691
692 440
        bprintf(buf, "${tmpdir}/%s", name);
693 440
        vsb = macro_expand(h->vl, buf);
694 440
        AN(vsb);
695 440
        h->workdir = strdup(VSB_data(vsb));
696 440
        AN(h->workdir);
697 440
        VSB_destroy(&vsb);
698
699 440
        bprintf(buf, "%s/stats.sock", h->workdir);
700 440
        h->cli_fn = strdup(buf);
701 440
        AN(h->cli_fn);
702
703 440
        bprintf(buf, "%s/cfg", h->workdir);
704 440
        h->cfg_fn = strdup(buf);
705 440
        AN(h->cfg_fn);
706
707
        /* Create a new TCP socket to reserve an IP:port and close it asap.
708
         * May be useful to simulate an unreachable server.
709
         */
710 440
        bprintf(h->closed_sock, "%s_closed", h->name);
711 440
        closed_sock = VTCP_listen_on("127.0.0.1:0", NULL, 100, &err);
712 440
        if (err != NULL)
713 0
                vtc_fatal(h->vl,
714 0
                        "Create listen socket failed: %s", err);
715 440
        assert(closed_sock > 0);
716 440
        sua = VSA_getsockname(closed_sock, vsabuf, sizeof vsabuf);
717 440
        AN(sua);
718 440
        VTCP_name(sua, addr, sizeof addr, port, sizeof port);
719 440
        if (VSA_Get_Proto(sua) == AF_INET)
720 440
                macro_def(h->vl, h->closed_sock, "sock", "%s:%s", addr, port);
721
        else
722 0
                macro_def(h->vl, h->closed_sock, "sock", "[%s]:%s", addr, port);
723 440
        macro_def(h->vl, h->closed_sock, "addr", "%s", addr);
724 440
        macro_def(h->vl, h->closed_sock, "port", "%s", port);
725 440
        VTCP_close(&closed_sock);
726
727 440
        h->cli = haproxy_cli_new(h);
728 440
        AN(h->cli);
729
730 440
        h->mcli = haproxy_mcli_new(h);
731 440
        AN(h->mcli);
732
733 440
        bprintf(buf, "rm -rf \"%s\" ; mkdir -p \"%s\"", h->workdir, h->workdir);
734 440
        AZ(system(buf));
735
736 440
        h->sd_sock = -1;
737
738 440
        VTAILQ_INIT(&h->envars);
739 440
        VTAILQ_INSERT_TAIL(&haproxies, h, list);
740
741 440
        return (h);
742 440
}
743
744
/**********************************************************************
745
 * Delete a haproxy instance
746
 */
747
748
static void
749 440
haproxy_delete(struct haproxy *h)
750
{
751
        char buf[PATH_MAX];
752
753 440
        CHECK_OBJ_NOTNULL(h, HAPROXY_MAGIC);
754 440
        vtc_logclose(h->vl);
755
756 440
        if (!leave_temp) {
757 440
                bprintf(buf, "rm -rf \"%s\"", h->workdir);
758 440
                AZ(system(buf));
759 440
        }
760
761 840
        if (h->sd_sock >= 0)
762 40
                closefd(&h->sd_sock);
763
764 440
        free(h->name);
765 440
        free(h->workdir);
766 440
        free(h->cli_fn);
767 440
        free(h->cfg_fn);
768 440
        free(h->pid_fn);
769 440
        VSB_destroy(&h->args);
770 440
        haproxy_cli_delete(h->cli);
771 440
        haproxy_cli_delete(h->mcli);
772
773
        /* XXX: MEMLEAK (?) */
774 440
        FREE_OBJ(h);
775 440
}
776
777
/**********************************************************************
778
 * HAProxy listener
779
 */
780
781
static void *
782 440
haproxy_thread(void *priv)
783
{
784
        struct haproxy *h;
785
786 440
        CAST_OBJ_NOTNULL(h, priv, HAPROXY_MAGIC);
787 440
        (void)vtc_record(h->vl, h->fds[0], h->msgs);
788 440
        h->its_dead_jim = 1;
789 440
        return (NULL);
790
}
791
792
793
/**********************************************************************
794
 * Start a HAProxy instance.
795
 */
796
797
static void
798 440
haproxy_start(struct haproxy *h)
799
{
800
        char buf[PATH_MAX];
801
        struct vsb *vsb;
802
803 440
        vtc_log(h->vl, 2, "%s", __func__);
804
805 440
        AZ(VSB_finish(h->args));
806 880
        vtc_log(h->vl, 4, "opt_worker %d opt_daemon %d opt_check_mode %d opt_mcli %d",
807 440
            h->opt_worker, h->opt_daemon, h->opt_check_mode, h->opt_mcli);
808
809 440
        vsb = VSB_new_auto();
810 440
        AN(vsb);
811
812 440
        VSB_printf(vsb, "exec \"%s\"", h->filename);
813 440
        if (h->opt_check_mode)
814 80
                VSB_cat(vsb, " -c");
815 360
        else if (h->opt_daemon)
816 120
                VSB_cat(vsb, " -D");
817
        else
818 240
                VSB_cat(vsb, " -d");
819
820 440
        if (h->opt_worker) {
821 40
                if (h->opt_worker == 2) { /* sd_notify mode */
822 40
                        VSB_cat(vsb, " -Ws");
823 40
                        haproxy_bind_sdnotify(h);
824 40
                } else {
825 0
                        VSB_cat(vsb, " -W");
826
                }
827 40
                if (h->opt_mcli) {
828
                        int sock;
829 40
                        sock = haproxy_create_mcli(h);
830 40
                        VSB_printf(vsb, " -S \"fd@%d\"", sock);
831 40
                }
832 40
        }
833
834 400
        VSB_printf(vsb, " %s", VSB_data(h->args));
835
836 400
        VSB_printf(vsb, " -f \"%s\" ", h->cfg_fn);
837
838 400
        if (h->opt_worker || h->opt_daemon) {
839 160
                bprintf(buf, "%s/pid", h->workdir);
840 160
                h->pid_fn = strdup(buf);
841 160
                AN(h->pid_fn);
842 160
                VSB_printf(vsb, " -p \"%s\"", h->pid_fn);
843 160
        }
844
845 440
        AZ(VSB_finish(vsb));
846 440
        vtc_dump(h->vl, 4, "argv", VSB_data(vsb), -1);
847
848 440
        if (h->opt_worker && !h->opt_daemon) {
849
                /*
850
                 * HAProxy master process must exit with status 128 + <signum>
851
                 * if signaled by <signum> signal.
852
                 */
853 40
                h->expect_exit = HAPROXY_EXPECT_EXIT;
854 40
        }
855
856 440
        haproxy_write_conf(h);
857
858 440
        AZ(pipe(&h->fds[0]));
859 440
        vtc_log(h->vl, 4, "XXX %d @%d", h->fds[1], __LINE__);
860 440
        AZ(pipe(&h->fds[2]));
861 440
        h->pid = h->ppid = fork();
862 440
        assert(h->pid >= 0);
863 880
        if (h->pid == 0) {
864 440
                haproxy_build_env(h);
865 440
                haproxy_delete_envars(h);
866 440
                AZ(chdir(h->name));
867 440
                AZ(dup2(h->fds[0], 0));
868 440
                assert(dup2(h->fds[3], 1) == 1);
869 440
                assert(dup2(1, 2) == 2);
870 440
                closefd(&h->fds[0]);
871 440
                closefd(&h->fds[1]);
872 440
                closefd(&h->fds[2]);
873 440
                closefd(&h->fds[3]);
874 440
                AZ(execl("/bin/sh", "/bin/sh", "-c", VSB_data(vsb), (char*)0));
875 0
                exit(1);
876
        }
877 440
        VSB_destroy(&vsb);
878
879 440
        vtc_log(h->vl, 3, "PID: %ld", (long)h->pid);
880 440
        macro_def(h->vl, h->name, "pid", "%ld", (long)h->pid);
881 440
        macro_def(h->vl, h->name, "name", "%s", h->workdir);
882
883 440
        closefd(&h->fds[0]);
884 440
        closefd(&h->fds[3]);
885 440
        h->fds[0] = h->fds[2];
886 440
        h->fds[2] = h->fds[3] = -1;
887
888 440
        PTOK(pthread_create(&h->tp, NULL, haproxy_thread, h));
889
890 440
        if (h->pid_fn != NULL)
891 160
                haproxy_wait_pidfile(h);
892
893 280
        if (h->opt_worker == 2) /* sd_notify mode */
894 40
                haproxy_wait_sdnotify_ready(h);
895 440
}
896
897
898
/**********************************************************************
899
 * Wait for a HAProxy instance.
900
 */
901
902
static void
903 440
haproxy_wait(struct haproxy *h)
904
{
905
        void *p;
906
        int i, n, sig;
907
908 440
        vtc_log(h->vl, 2, "Wait");
909
910 440
        if (h->pid < 0)
911 0
                haproxy_start(h);
912
913 0
        if (h->cli->spec)
914 0
                haproxy_cli_run(h->cli);
915
916 0
        if (h->mcli->spec)
917 0
                haproxy_cli_run(h->mcli);
918
919 440
        closefd(&h->fds[1]);
920
921 440
        sig = SIGINT;
922 440
        n = 0;
923 440
        vtc_log(h->vl, 2, "Stop HAproxy pid=%ld", (long)h->pid);
924 3080
        while (h->opt_daemon || (!h->opt_check_mode && !h->its_dead_jim)) {
925 2760
                assert(h->pid > 0);
926 2760
                if (n == 0) {
927 480
                        i = kill(h->pid, sig);
928 480
                        if (i == 0)
929 360
                                h->expect_signal = -sig;
930 600
                        if (i && errno == ESRCH)
931 120
                                break;
932 720
                        vtc_log(h->vl, 4,
933 360
                            "Kill(%d)=%d: %s", sig, i, strerror(errno));
934 360
                }
935 600
                VTIM_sleep(0.1);
936 600
                if (++n == 20) {
937 120
                        switch (sig) {
938 120
                        case SIGINT:    sig = SIGTERM ; break;
939 0
                        case SIGTERM:   sig = SIGKILL ; break;
940 0
                        default:        break;
941
                        }
942 120
                        n = 0;
943 120
                }
944
        }
945
946 440
        PTOK(pthread_join(h->tp, &p));
947 440
        AZ(p);
948 440
        closefd(&h->fds[0]);
949 440
        if (!h->opt_daemon) {
950 320
                vtc_wait4(h->vl, h->ppid, h->expect_exit, h->expect_signal, 0);
951 320
                h->ppid = -1;
952 320
        }
953 440
        h->pid = -1;
954 440
}
955
956
#define HAPROXY_BE_FD_STR     "fd@${"
957
#define HAPROXY_BE_FD_STRLEN  strlen(HAPROXY_BE_FD_STR)
958
959
static int
960
haproxy_build_backends(struct haproxy *h, const char *vsb_data)
961
{
962
        char *s, *p, *q;
963
964
        s = strdup(vsb_data);
965
        if (!s)
966
                return (-1);
967
968 440
        p = s;
969
        while (1) {
970
                int sock;
971 440
                char buf[128], addr[128], port[128];
972
                const char *err;
973 440
                char vsabuf[vsa_suckaddr_len];
974 440
                const struct suckaddr *sua;
975 0
976
                p = strstr(p, HAPROXY_BE_FD_STR);
977 440
                if (!p)
978 0
                        break;
979 0
980 440
                q = p += HAPROXY_BE_FD_STRLEN;
981 1200
                while (*q && *q != '}')
982
                        q++;
983
                if (*q != '}')
984
                        break;
985 1200
986
                *q++ = '\0';
987
                sock = VTCP_listen_on("127.0.0.1:0", NULL, 100, &err);
988
                if (err != NULL)
989 1200
                        vtc_fatal(h->vl,
990 1200
                            "Create listen socket failed: %s", err);
991 440
                assert(sock > 0);
992
                sua = VSA_getsockname(sock, vsabuf, sizeof vsabuf);
993
                AN(sua);
994
995
                VTCP_name(sua, addr, sizeof addr, port, sizeof port);
996
                bprintf(buf, "%s_%s", h->name, p);
997
                if (VSA_Get_Proto(sua) == AF_INET)
998
                        macro_def(h->vl, buf, "sock", "%s:%s", addr, port);
999 760
                else
1000 760
                        macro_def(h->vl, buf, "sock", "[%s]:%s", addr, port);
1001 760
                macro_def(h->vl, buf, "addr", "%s", addr);
1002
                macro_def(h->vl, buf, "port", "%s", port);
1003 1520
1004 760
                bprintf(buf, "%d", sock);
1005 760
                vtc_log(h->vl, 4, "setenv(%s, %s)", p, buf);
1006
                haproxy_add_envar(h, p, buf);
1007 760
                p = q;
1008 0
        }
1009 0
        free(s);
1010
        return (0);
1011 760
}
1012 3200
1013 2440
static void
1014 760
haproxy_check_conf(struct haproxy *h, const char *expect)
1015 0
{
1016
1017 760
        h->msgs = VSB_new_auto();
1018 760
        AN(h->msgs);
1019 0
        h->opt_check_mode = 1;
1020 0
        haproxy_start(h);
1021
        haproxy_wait(h);
1022 760
        AZ(VSB_finish(h->msgs));
1023
        if (strstr(VSB_data(h->msgs), expect) == NULL)
1024 760
                vtc_fatal(h->vl, "Did not find expected string '%s'", expect);
1025 0
        vtc_log(h->vl, 2, "Found expected '%s'", expect);
1026 0
        VSB_destroy(&h->msgs);
1027 760
}
1028 760
1029 760
/**********************************************************************
1030
 * Write a configuration for <h> HAProxy instance.
1031 760
 */
1032 760
1033 760
static void
1034 760
haproxy_store_conf(struct haproxy *h, const char *cfg, int auto_be)
1035
{
1036 0
        struct vsb *vsb, *vsb2;
1037 760
1038 760
        vsb = VSB_new_auto();
1039
        AN(vsb);
1040 760
1041 1520
        vsb2 = VSB_new_auto();
1042 760
        AN(vsb2);
1043 760
1044 760
        VSB_printf(vsb, "    global\n\tstats socket \"%s\" "
1045 1200
                   "level admin mode 600\n", h->cli_fn);
1046 440
        VSB_cat(vsb, "    stats socket \"fd@${cli}\" level admin\n");
1047 440
        AZ(VSB_cat(vsb, cfg));
1048 440
1049
        if (auto_be)
1050
                cmd_server_gen_haproxy_conf(vsb);
1051 80
1052
        AZ(VSB_finish(vsb));
1053
1054 80
        AZ(haproxy_build_backends(h, VSB_data(vsb)));
1055 80
1056 80
        h->cfg_vsb = macro_expand(h->vl, VSB_data(vsb));
1057 80
        AN(h->cfg_vsb);
1058 80
1059 80
        VSB_destroy(&vsb2);
1060 80
        VSB_destroy(&vsb);
1061 0
}
1062 80
1063 80
static void
1064 80
haproxy_write_conf(struct haproxy *h)
1065
{
1066
        struct vsb *vsb;
1067
1068
        vsb = macro_expand(h->vl, VSB_data(h->cfg_vsb));
1069
        AN(vsb);
1070
        assert(VSB_len(vsb) >= 0);
1071 440
1072
        vtc_dump(h->vl, 4, "conf", VSB_data(vsb), VSB_len(vsb));
1073
        if (VFIL_writefile(h->workdir, h->cfg_fn,
1074
            VSB_data(vsb), VSB_len(vsb)) != 0)
1075 440
                vtc_fatal(h->vl,
1076 440
                    "failed to write haproxy configuration file: %s (%d)",
1077
                    strerror(errno), errno);
1078 440
1079 440
        VSB_destroy(&vsb);
1080
}
1081 880
1082 440
/* SECTION: haproxy haproxy
1083 440
 *
1084 440
 * Define and interact with haproxy instances.
1085
 *
1086 440
 * To define a haproxy server, you'll use this syntax::
1087 40
 *
1088
 *      haproxy hNAME -conf-OK CONFIG
1089 440
 *      haproxy hNAME -conf-BAD ERROR CONFIG
1090
 *      haproxy hNAME [-D] [-W] [-arg STRING] [-conf[+vcl] STRING]
1091 440
 *
1092
 * The first ``haproxy hNAME`` invocation will start the haproxy master
1093 440
 * process in the background, waiting for the ``-start`` switch to actually
1094 440
 * start the child.
1095
 *
1096 440
 * Arguments:
1097 440
 *
1098 440
 * hNAME
1099
 *         Identify the HAProxy server with a string, it must starts with 'h'.
1100
 *
1101 440
 * \-conf-OK CONFIG
1102
 *         Run haproxy in '-c' mode to check config is OK
1103
 *         stdout/stderr should contain 'Configuration file is valid'
1104
 *         The exit code should be 0.
1105 440
 *
1106 440
 * \-conf-BAD ERROR CONFIG
1107 440
 *         Run haproxy in '-c' mode to check config is BAD.
1108
 *         "ERROR" should be part of the diagnostics on stdout/stderr.
1109 440
 *         The exit code should be 1.
1110 1320
 *
1111 880
 * \-D
1112 0
 *         Run HAproxy in daemon mode.  If not given '-d' mode used.
1113
 *
1114 0
 * \-W
1115
 *         Enable HAproxy in Worker mode.
1116 440
 *
1117 440
 * \-S
1118
 *         Enable HAproxy Master CLI in Worker mode
1119
 *
1120
 * \-arg STRING
1121
 *         Pass an argument to haproxy, for example "-h simple_list".
1122
 *
1123
 * \-cli STRING
1124
 *         Specify the spec to be run by the command line interface (CLI).
1125
 *
1126
 * \-mcli STRING
1127
 *         Specify the spec to be run by the command line interface (CLI)
1128
 *         of the Master process.
1129
 *
1130
 * \-conf STRING
1131
 *         Specify the configuration to be loaded by this HAProxy instance.
1132
 *
1133
 * \-conf+backend STRING
1134
 *         Specify the configuration to be loaded by this HAProxy instance,
1135
 *         all server instances will be automatically appended
1136
 *
1137
 * \-start
1138
 *         Start this HAProxy instance.
1139
 *
1140
 * \-wait
1141
 *         Stop this HAProxy instance.
1142
 *
1143
 * \-expectexit NUMBER
1144
 *         Expect haproxy to exit(3) with this value
1145
 *
1146
 */
1147
1148
void
1149
cmd_haproxy(CMD_ARGS)
1150
{
1151
        struct haproxy *h, *h2;
1152
1153
        (void)priv;
1154
1155
        if (av == NULL) {
1156
                /* Reset and free */
1157
                VTAILQ_FOREACH_SAFE(h, &haproxies, list, h2) {
1158
                        vtc_log(h->vl, 2,
1159
                            "Reset and free %s haproxy %ld",
1160
                            h->name, (long)h->pid);
1161
                        if (h->pid >= 0)
1162
                                haproxy_wait(h);
1163
                        VTAILQ_REMOVE(&haproxies, h, list);
1164
                        haproxy_delete(h);
1165
                }
1166
                return;
1167
        }
1168
1169
        AZ(strcmp(av[0], "haproxy"));
1170
        av++;
1171
1172
        VTC_CHECK_NAME(vl, av[0], "haproxy", 'h');
1173
        VTAILQ_FOREACH(h, &haproxies, list)
1174
                if (!strcmp(h->name, av[0]))
1175
                        break;
1176
        if (h == NULL)
1177
                h = haproxy_new(av[0]);
1178
        av++;
1179
1180
        for (; *av != NULL; av++) {
1181
                if (vtc_error)
1182
                        break;
1183
1184
                if (!strcmp(*av, "-conf-OK")) {
1185
                        AN(av[1]);
1186 41960
                        haproxy_store_conf(h, av[1], 0);
1187
                        h->expect_exit = 0;
1188
                        haproxy_check_conf(h, "");
1189
                        av++;
1190 41960
                        continue;
1191
                }
1192 41960
                if (!strcmp(*av, "-conf-BAD")) {
1193
                        AN(av[1]);
1194 41840
                        AN(av[2]);
1195 880
                        haproxy_store_conf(h, av[2], 0);
1196
                        h->expect_exit = 1;
1197 440
                        haproxy_check_conf(h, av[1]);
1198 440
                        av += 2;
1199 240
                        continue;
1200 440
                }
1201 440
1202 440
                if (!strcmp(*av, HAPROXY_OPT_DAEMON)) {
1203 41400
                        h->opt_daemon = 1;
1204
                        continue;
1205
                }
1206 560
                if (!strcmp(*av, HAPROXY_OPT_WORKER)) {
1207 560
                        h->opt_worker = 1;
1208
                        continue;
1209 560
                }
1210 640
                if (!strcmp(*av, HAPROXY_OPT_SD_WORKER)) {
1211 200
                        h->opt_worker = 2;
1212 120
                        continue;
1213 440
                }
1214 440
                if (!strcmp(*av, HAPROXY_OPT_MCLI)) {
1215 560
                        h->opt_mcli = 1;
1216
                        continue;
1217 1760
                }
1218 1200
                if (!strcmp(*av, "-arg")) {
1219 0
                        AN(av[1]);
1220
                        AZ(h->pid);
1221 1200
                        VSB_cat(h->args, " ");
1222 40
                        VSB_cat(h->args, av[1]);
1223 40
                        av++;
1224 40
                        continue;
1225 40
                }
1226 40
1227 40
                if (!strcmp(*av, "-cli")) {
1228
                        REPLACE(h->cli->spec, av[1]);
1229 1160
                        if (h->tp)
1230 40
                                haproxy_cli_run(h->cli);
1231 40
                        av++;
1232 40
                        continue;
1233 40
                }
1234 40
1235 40
                if (!strcmp(*av, "-mcli")) {
1236 40
                        REPLACE(h->mcli->spec, av[1]);
1237
                        if (h->tp)
1238
                                haproxy_cli_run(h->mcli);
1239 1120
                        av++;
1240 120
                        continue;
1241 120
                }
1242
1243 1000
                if (!strcmp(*av, "-conf")) {
1244 0
                        AN(av[1]);
1245 0
                        haproxy_store_conf(h, av[1], 0);
1246
                        av++;
1247 1000
                        continue;
1248 40
                }
1249 40
                if (!strcmp(*av, "-conf+backend")) {
1250
                        AN(av[1]);
1251 960
                        haproxy_store_conf(h, av[1], 1);
1252 40
                        av++;
1253 40
                        continue;
1254
                }
1255 920
1256 0
                if (!strcmp(*av, "-expectexit")) {
1257 0
                        h->expect_exit = strtoul(av[1], NULL, 0);
1258 0
                        av++;
1259 0
                        continue;
1260 0
                }
1261 0
                if (!strcmp(*av, "-start")) {
1262
                        haproxy_start(h);
1263
                        continue;
1264 920
                }
1265 40
                if (!strcmp(*av, "-wait")) {
1266 40
                        haproxy_wait(h);
1267 40
                        continue;
1268 40
                }
1269 40
                vtc_fatal(h->vl, "Unknown haproxy argument: %s", *av);
1270
        }
1271
}