/* Choose the header browsing function. */
switch (action) {
- case HTTP_REQ_ACT_REPLACE_VAL:
- case HTTP_RES_ACT_REPLACE_VAL:
+ case ACT_HTTP_REPLACE_VAL:
http_find_hdr_func = http_find_header2;
break;
- case HTTP_REQ_ACT_REPLACE_HDR:
- case HTTP_RES_ACT_REPLACE_HDR:
+ case ACT_HTTP_REPLACE_HDR:
http_find_hdr_func = http_find_full_header2;
break;
default: /* impossible */
resume_execution:
switch (rule->action) {
- case HTTP_REQ_ACT_ALLOW:
+ case ACT_ACTION_ALLOW:
return HTTP_RULE_RES_STOP;
- case HTTP_REQ_ACT_DENY:
+ case ACT_ACTION_DENY:
txn->rule_deny_status = rule->deny_status;
return HTTP_RULE_RES_DENY;
- case HTTP_REQ_ACT_TARPIT:
+ case ACT_HTTP_REQ_TARPIT:
txn->flags |= TX_CLTARPIT;
txn->rule_deny_status = rule->deny_status;
return HTTP_RULE_RES_DENY;
- case HTTP_REQ_ACT_AUTH:
+ case ACT_HTTP_REQ_AUTH:
/* Auth might be performed on regular http-req rules as well as on stats */
auth_realm = rule->arg.auth.realm;
if (!auth_realm) {
stream_inc_http_err_ctr(s);
return HTTP_RULE_RES_ABRT;
- case HTTP_REQ_ACT_REDIR:
+ case ACT_HTTP_REDIR:
if (!http_apply_redirect_rule(rule->arg.redir, s, txn))
return HTTP_RULE_RES_BADREQ;
return HTTP_RULE_RES_DONE;
- case HTTP_REQ_ACT_SET_NICE:
+ case ACT_HTTP_SET_NICE:
s->task->nice = rule->arg.nice;
break;
- case HTTP_REQ_ACT_SET_TOS:
+ case ACT_HTTP_SET_TOS:
if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn))
inet_set_tos(cli_conn->t.sock.fd, cli_conn->addr.from, rule->arg.tos);
break;
- case HTTP_REQ_ACT_SET_MARK:
+ case ACT_HTTP_SET_MARK:
#ifdef SO_MARK
if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn))
setsockopt(cli_conn->t.sock.fd, SOL_SOCKET, SO_MARK, &rule->arg.mark, sizeof(rule->arg.mark));
#endif
break;
- case HTTP_REQ_ACT_SET_LOGL:
+ case ACT_HTTP_SET_LOGL:
s->logs.level = rule->arg.loglevel;
break;
- case HTTP_REQ_ACT_REPLACE_HDR:
- case HTTP_REQ_ACT_REPLACE_VAL:
+ case ACT_HTTP_REPLACE_HDR:
+ case ACT_HTTP_REPLACE_VAL:
if (http_transform_header(s, &txn->req, rule->arg.hdr_add.name,
rule->arg.hdr_add.name_len,
&rule->arg.hdr_add.fmt,
return HTTP_RULE_RES_BADREQ;
break;
- case HTTP_REQ_ACT_DEL_HDR:
+ case ACT_HTTP_DEL_HDR:
ctx.idx = 0;
/* remove all occurrences of the header */
while (http_find_header2(rule->arg.hdr_add.name, rule->arg.hdr_add.name_len,
}
break;
- case HTTP_REQ_ACT_SET_HDR:
- case HTTP_REQ_ACT_ADD_HDR:
+ case ACT_HTTP_SET_HDR:
+ case ACT_HTTP_ADD_HDR:
chunk_printf(&trash, "%s: ", rule->arg.hdr_add.name);
memcpy(trash.str, rule->arg.hdr_add.name, rule->arg.hdr_add.name_len);
trash.len = rule->arg.hdr_add.name_len;
trash.str[trash.len++] = ' ';
trash.len += build_logline(s, trash.str + trash.len, trash.size - trash.len, &rule->arg.hdr_add.fmt);
- if (rule->action == HTTP_REQ_ACT_SET_HDR) {
+ if (rule->action == ACT_HTTP_SET_HDR) {
/* remove all occurrences of the header */
ctx.idx = 0;
while (http_find_header2(rule->arg.hdr_add.name, rule->arg.hdr_add.name_len,
http_header_add_tail2(&txn->req, &txn->hdr_idx, trash.str, trash.len);
break;
- case HTTP_REQ_ACT_DEL_ACL:
- case HTTP_REQ_ACT_DEL_MAP: {
+ case ACT_HTTP_DEL_ACL:
+ case ACT_HTTP_DEL_MAP: {
struct pat_ref *ref;
char *key;
int len;
break;
}
- case HTTP_REQ_ACT_ADD_ACL: {
+ case ACT_HTTP_ADD_ACL: {
struct pat_ref *ref;
char *key;
struct chunk *trash_key;
break;
}
- case HTTP_REQ_ACT_SET_MAP: {
+ case ACT_HTTP_SET_MAP: {
struct pat_ref *ref;
char *key, *value;
struct chunk *trash_key, *trash_value;
rule->action_ptr(rule, px, s->sess, s);
return HTTP_RULE_RES_DONE;
- case HTTP_REQ_ACT_TRK_SC0 ... HTTP_REQ_ACT_TRK_SCMAX:
+ case ACT_ACTION_TRK_SC0 ... ACT_ACTION_TRK_SCMAX:
/* Note: only the first valid tracking parameter of each
* applies.
*/
}
break;
- case HTTP_REQ_ACT_SET_SRC:
+ case ACT_HTTP_REQ_SET_SRC:
if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn)) {
struct sample *smp;
resume_execution:
switch (rule->action) {
- case HTTP_RES_ACT_ALLOW:
+ case ACT_ACTION_ALLOW:
return HTTP_RULE_RES_STOP; /* "allow" rules are OK */
- case HTTP_RES_ACT_DENY:
+ case ACT_ACTION_DENY:
txn->flags |= TX_SVDENY;
return HTTP_RULE_RES_STOP;
- case HTTP_RES_ACT_SET_NICE:
+ case ACT_HTTP_SET_NICE:
s->task->nice = rule->arg.nice;
break;
- case HTTP_RES_ACT_SET_TOS:
+ case ACT_HTTP_SET_TOS:
if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn))
inet_set_tos(cli_conn->t.sock.fd, cli_conn->addr.from, rule->arg.tos);
break;
- case HTTP_RES_ACT_SET_MARK:
+ case ACT_HTTP_SET_MARK:
#ifdef SO_MARK
if ((cli_conn = objt_conn(sess->origin)) && conn_ctrl_ready(cli_conn))
setsockopt(cli_conn->t.sock.fd, SOL_SOCKET, SO_MARK, &rule->arg.mark, sizeof(rule->arg.mark));
#endif
break;
- case HTTP_RES_ACT_SET_LOGL:
+ case ACT_HTTP_SET_LOGL:
s->logs.level = rule->arg.loglevel;
break;
- case HTTP_RES_ACT_REPLACE_HDR:
- case HTTP_RES_ACT_REPLACE_VAL:
+ case ACT_HTTP_REPLACE_HDR:
+ case ACT_HTTP_REPLACE_VAL:
if (http_transform_header(s, &txn->rsp, rule->arg.hdr_add.name,
rule->arg.hdr_add.name_len,
&rule->arg.hdr_add.fmt,
return HTTP_RULE_RES_STOP; /* note: we should report an error here */
break;
- case HTTP_RES_ACT_DEL_HDR:
+ case ACT_HTTP_DEL_HDR:
ctx.idx = 0;
/* remove all occurrences of the header */
while (http_find_header2(rule->arg.hdr_add.name, rule->arg.hdr_add.name_len,
}
break;
- case HTTP_RES_ACT_SET_HDR:
- case HTTP_RES_ACT_ADD_HDR:
+ case ACT_HTTP_SET_HDR:
+ case ACT_HTTP_ADD_HDR:
chunk_printf(&trash, "%s: ", rule->arg.hdr_add.name);
memcpy(trash.str, rule->arg.hdr_add.name, rule->arg.hdr_add.name_len);
trash.len = rule->arg.hdr_add.name_len;
trash.str[trash.len++] = ' ';
trash.len += build_logline(s, trash.str + trash.len, trash.size - trash.len, &rule->arg.hdr_add.fmt);
- if (rule->action == HTTP_RES_ACT_SET_HDR) {
+ if (rule->action == ACT_HTTP_SET_HDR) {
/* remove all occurrences of the header */
ctx.idx = 0;
while (http_find_header2(rule->arg.hdr_add.name, rule->arg.hdr_add.name_len,
http_header_add_tail2(&txn->rsp, &txn->hdr_idx, trash.str, trash.len);
break;
- case HTTP_RES_ACT_DEL_ACL:
- case HTTP_RES_ACT_DEL_MAP: {
+ case ACT_HTTP_DEL_ACL:
+ case ACT_HTTP_DEL_MAP: {
struct pat_ref *ref;
char *key;
int len;
break;
}
- case HTTP_RES_ACT_ADD_ACL: {
+ case ACT_HTTP_ADD_ACL: {
struct pat_ref *ref;
char *key;
struct chunk *trash_key;
break;
}
- case HTTP_RES_ACT_SET_MAP: {
+ case ACT_HTTP_SET_MAP: {
struct pat_ref *ref;
char *key, *value;
struct chunk *trash_key, *trash_value;
break;
}
- case HTTP_RES_ACT_REDIR:
+ case ACT_HTTP_REDIR:
if (!http_apply_redirect_rule(rule->arg.redir, s, txn))
return HTTP_RULE_RES_BADREQ;
return HTTP_RULE_RES_DONE;
list_for_each_entry_safe(pr, tr, r, list) {
LIST_DEL(&pr->list);
- if (pr->action == HTTP_REQ_ACT_AUTH)
+ if (pr->action == ACT_HTTP_REQ_AUTH)
free(pr->arg.auth.realm);
regex_free(&pr->arg.hdr_add.re);
rule->deny_status = HTTP_ERR_403;
if (!strcmp(args[0], "allow")) {
- rule->action = HTTP_REQ_ACT_ALLOW;
+ rule->action = ACT_ACTION_ALLOW;
cur_arg = 1;
} else if (!strcmp(args[0], "deny") || !strcmp(args[0], "block")) {
int code;
int hc;
- rule->action = HTTP_REQ_ACT_DENY;
+ rule->action = ACT_ACTION_DENY;
cur_arg = 1;
if (strcmp(args[cur_arg], "deny_status") == 0) {
cur_arg++;
}
}
} else if (!strcmp(args[0], "tarpit")) {
- rule->action = HTTP_REQ_ACT_TARPIT;
+ rule->action = ACT_HTTP_REQ_TARPIT;
cur_arg = 1;
} else if (!strcmp(args[0], "auth")) {
- rule->action = HTTP_REQ_ACT_AUTH;
+ rule->action = ACT_HTTP_REQ_AUTH;
cur_arg = 1;
while(*args[cur_arg]) {
break;
}
} else if (!strcmp(args[0], "set-nice")) {
- rule->action = HTTP_REQ_ACT_SET_NICE;
+ rule->action = ACT_HTTP_SET_NICE;
cur_arg = 1;
if (!*args[cur_arg] ||
} else if (!strcmp(args[0], "set-tos")) {
#ifdef IP_TOS
char *err;
- rule->action = HTTP_REQ_ACT_SET_TOS;
+ rule->action = ACT_HTTP_SET_TOS;
cur_arg = 1;
if (!*args[cur_arg] ||
} else if (!strcmp(args[0], "set-mark")) {
#ifdef SO_MARK
char *err;
- rule->action = HTTP_REQ_ACT_SET_MARK;
+ rule->action = ACT_HTTP_SET_MARK;
cur_arg = 1;
if (!*args[cur_arg] ||
goto out_err;
#endif
} else if (!strcmp(args[0], "set-log-level")) {
- rule->action = HTTP_REQ_ACT_SET_LOGL;
+ rule->action = ACT_HTTP_SET_LOGL;
cur_arg = 1;
if (!*args[cur_arg] ||
goto bad_log_level;
cur_arg++;
} else if (strcmp(args[0], "add-header") == 0 || strcmp(args[0], "set-header") == 0) {
- rule->action = *args[0] == 'a' ? HTTP_REQ_ACT_ADD_HDR : HTTP_REQ_ACT_SET_HDR;
+ rule->action = *args[0] == 'a' ? ACT_HTTP_ADD_HDR : ACT_HTTP_SET_HDR;
cur_arg = 1;
if (!*args[cur_arg] || !*args[cur_arg+1] ||
proxy->conf.lfs_line = proxy->conf.args.line;
cur_arg += 2;
} else if (strcmp(args[0], "replace-header") == 0 || strcmp(args[0], "replace-value") == 0) {
- rule->action = args[0][8] == 'h' ? HTTP_REQ_ACT_REPLACE_HDR : HTTP_REQ_ACT_REPLACE_VAL;
+ rule->action = args[0][8] == 'h' ? ACT_HTTP_REPLACE_HDR : ACT_HTTP_REPLACE_VAL;
cur_arg = 1;
if (!*args[cur_arg] || !*args[cur_arg+1] || !*args[cur_arg+2] ||
proxy->conf.lfs_line = proxy->conf.args.line;
cur_arg += 3;
} else if (strcmp(args[0], "del-header") == 0) {
- rule->action = HTTP_REQ_ACT_DEL_HDR;
+ rule->action = ACT_HTTP_DEL_HDR;
cur_arg = 1;
if (!*args[cur_arg] ||
cur_arg++;
}
rule->arg.trk_ctr.expr = expr;
- rule->action = HTTP_REQ_ACT_TRK_SC0 + args[0][8] - '0';
+ rule->action = ACT_ACTION_TRK_SC0 + args[0][8] - '0';
} else if (strcmp(args[0], "redirect") == 0) {
struct redirect_rule *redir;
char *errmsg = NULL;
/* this redirect rule might already contain a parsed condition which
* we'll pass to the http-request rule.
*/
- rule->action = HTTP_REQ_ACT_REDIR;
+ rule->action = ACT_HTTP_REDIR;
rule->arg.redir = redir;
rule->cond = redir->cond;
redir->cond = NULL;
return rule;
} else if (strncmp(args[0], "add-acl", 7) == 0) {
/* http-request add-acl(<reference (acl name)>) <key pattern> */
- rule->action = HTTP_REQ_ACT_ADD_ACL;
+ rule->action = ACT_HTTP_ADD_ACL;
/*
* '+ 8' for 'add-acl('
* '- 9' for 'add-acl(' + trailing ')'
cur_arg += 1;
} else if (strncmp(args[0], "del-acl", 7) == 0) {
/* http-request del-acl(<reference (acl name)>) <key pattern> */
- rule->action = HTTP_REQ_ACT_DEL_ACL;
+ rule->action = ACT_HTTP_DEL_ACL;
/*
* '+ 8' for 'del-acl('
* '- 9' for 'del-acl(' + trailing ')'
cur_arg += 1;
} else if (strncmp(args[0], "del-map", 7) == 0) {
/* http-request del-map(<reference (map name)>) <key pattern> */
- rule->action = HTTP_REQ_ACT_DEL_MAP;
+ rule->action = ACT_HTTP_DEL_MAP;
/*
* '+ 8' for 'del-map('
* '- 9' for 'del-map(' + trailing ')'
cur_arg += 1;
} else if (strncmp(args[0], "set-map", 7) == 0) {
/* http-request set-map(<reference (map name)>) <key pattern> <value pattern> */
- rule->action = HTTP_REQ_ACT_SET_MAP;
+ rule->action = ACT_HTTP_SET_MAP;
/*
* '+ 8' for 'set-map('
* '- 9' for 'set-map(' + trailing ')'
}
rule->arg.expr = expr;
- rule->action = HTTP_REQ_ACT_SET_SRC;
+ rule->action = ACT_HTTP_REQ_SET_SRC;
} else if (((custom = action_http_req_custom(args[0])) != NULL)) {
char *errmsg = NULL;
cur_arg = 1;
}
if (!strcmp(args[0], "allow")) {
- rule->action = HTTP_RES_ACT_ALLOW;
+ rule->action = ACT_ACTION_ALLOW;
cur_arg = 1;
} else if (!strcmp(args[0], "deny")) {
- rule->action = HTTP_RES_ACT_DENY;
+ rule->action = ACT_ACTION_DENY;
cur_arg = 1;
} else if (!strcmp(args[0], "set-nice")) {
- rule->action = HTTP_RES_ACT_SET_NICE;
+ rule->action = ACT_HTTP_SET_NICE;
cur_arg = 1;
if (!*args[cur_arg] ||
} else if (!strcmp(args[0], "set-tos")) {
#ifdef IP_TOS
char *err;
- rule->action = HTTP_RES_ACT_SET_TOS;
+ rule->action = ACT_HTTP_SET_TOS;
cur_arg = 1;
if (!*args[cur_arg] ||
} else if (!strcmp(args[0], "set-mark")) {
#ifdef SO_MARK
char *err;
- rule->action = HTTP_RES_ACT_SET_MARK;
+ rule->action = ACT_HTTP_SET_MARK;
cur_arg = 1;
if (!*args[cur_arg] ||
goto out_err;
#endif
} else if (!strcmp(args[0], "set-log-level")) {
- rule->action = HTTP_RES_ACT_SET_LOGL;
+ rule->action = ACT_HTTP_SET_LOGL;
cur_arg = 1;
if (!*args[cur_arg] ||
goto bad_log_level;
cur_arg++;
} else if (strcmp(args[0], "add-header") == 0 || strcmp(args[0], "set-header") == 0) {
- rule->action = *args[0] == 'a' ? HTTP_RES_ACT_ADD_HDR : HTTP_RES_ACT_SET_HDR;
+ rule->action = *args[0] == 'a' ? ACT_HTTP_ADD_HDR : ACT_HTTP_SET_HDR;
cur_arg = 1;
if (!*args[cur_arg] || !*args[cur_arg+1] ||
proxy->conf.lfs_line = proxy->conf.args.line;
cur_arg += 2;
} else if (strcmp(args[0], "replace-header") == 0 || strcmp(args[0], "replace-value") == 0) {
- rule->action = args[0][8] == 'h' ? HTTP_RES_ACT_REPLACE_HDR : HTTP_RES_ACT_REPLACE_VAL;
+ rule->action = args[0][8] == 'h' ? ACT_HTTP_REPLACE_HDR : ACT_HTTP_REPLACE_VAL;
cur_arg = 1;
if (!*args[cur_arg] || !*args[cur_arg+1] || !*args[cur_arg+2] ||
proxy->conf.lfs_line = proxy->conf.args.line;
cur_arg += 3;
} else if (strcmp(args[0], "del-header") == 0) {
- rule->action = HTTP_RES_ACT_DEL_HDR;
+ rule->action = ACT_HTTP_DEL_HDR;
cur_arg = 1;
if (!*args[cur_arg] ||
cur_arg += 1;
} else if (strncmp(args[0], "add-acl", 7) == 0) {
/* http-request add-acl(<reference (acl name)>) <key pattern> */
- rule->action = HTTP_RES_ACT_ADD_ACL;
+ rule->action = ACT_HTTP_ADD_ACL;
/*
* '+ 8' for 'add-acl('
* '- 9' for 'add-acl(' + trailing ')'
cur_arg += 1;
} else if (strncmp(args[0], "del-acl", 7) == 0) {
/* http-response del-acl(<reference (acl name)>) <key pattern> */
- rule->action = HTTP_RES_ACT_DEL_ACL;
+ rule->action = ACT_HTTP_DEL_ACL;
/*
* '+ 8' for 'del-acl('
* '- 9' for 'del-acl(' + trailing ')'
cur_arg += 1;
} else if (strncmp(args[0], "del-map", 7) == 0) {
/* http-response del-map(<reference (map name)>) <key pattern> */
- rule->action = HTTP_RES_ACT_DEL_MAP;
+ rule->action = ACT_HTTP_DEL_MAP;
/*
* '+ 8' for 'del-map('
* '- 9' for 'del-map(' + trailing ')'
cur_arg += 1;
} else if (strncmp(args[0], "set-map", 7) == 0) {
/* http-response set-map(<reference (map name)>) <key pattern> <value pattern> */
- rule->action = HTTP_RES_ACT_SET_MAP;
+ rule->action = ACT_HTTP_SET_MAP;
/*
* '+ 8' for 'set-map('
* '- 9' for 'set-map(' + trailing ')'
/* this redirect rule might already contain a parsed condition which
* we'll pass to the http-request rule.
*/
- rule->action = HTTP_RES_ACT_REDIR;
+ rule->action = ACT_HTTP_REDIR;
rule->arg.redir = redir;
rule->cond = redir->cond;
redir->cond = NULL;
if (ret) {
resume_execution:
/* we have a matching rule. */
- if (rule->action == TCP_ACT_ACCEPT) {
+ if (rule->action == ACT_ACTION_ALLOW) {
break;
}
- else if (rule->action == TCP_ACT_REJECT) {
+ else if (rule->action == ACT_ACTION_DENY) {
channel_abort(req);
channel_abort(&s->res);
req->analysers = 0;
s->flags |= SF_FINST_R;
return 0;
}
- else if (rule->action >= TCP_ACT_TRK_SC0 && rule->action <= TCP_ACT_TRK_SCMAX) {
+ else if (rule->action >= ACT_ACTION_TRK_SC0 && rule->action <= ACT_ACTION_TRK_SCMAX) {
/* Note: only the first valid tracking parameter of each
* applies.
*/
stkctr_set_flags(&s->stkctr[tcp_trk_idx(rule->action)], STKCTR_TRACK_BACKEND);
}
}
- else if (rule->action == TCP_ACT_CAPTURE) {
+ else if (rule->action == ACT_TCP_CAPTURE) {
struct sample *key;
struct cap_hdr *h = rule->arg.cap.hdr;
char **cap = s->req_cap;
if (ret) {
resume_execution:
/* we have a matching rule. */
- if (rule->action == TCP_ACT_ACCEPT) {
+ if (rule->action == ACT_ACTION_ALLOW) {
break;
}
- else if (rule->action == TCP_ACT_REJECT) {
+ else if (rule->action == ACT_ACTION_DENY) {
channel_abort(rep);
channel_abort(&s->req);
rep->analysers = 0;
s->flags |= SF_FINST_D;
return 0;
}
- else if (rule->action == TCP_ACT_CLOSE) {
+ else if (rule->action == ACT_TCP_CLOSE) {
chn_prod(rep)->flags |= SI_FL_NOLINGER | SI_FL_NOHALF;
si_shutr(chn_prod(rep));
si_shutw(chn_prod(rep));
if (ret) {
/* we have a matching rule. */
- if (rule->action == TCP_ACT_ACCEPT) {
+ if (rule->action == ACT_ACTION_ALLOW) {
break;
}
- else if (rule->action == TCP_ACT_REJECT) {
+ else if (rule->action == ACT_ACTION_DENY) {
sess->fe->fe_counters.denied_conn++;
if (sess->listener->counters)
sess->listener->counters->denied_conn++;
result = 0;
break;
}
- else if (rule->action >= TCP_ACT_TRK_SC0 && rule->action <= TCP_ACT_TRK_SCMAX) {
+ else if (rule->action >= ACT_ACTION_TRK_SC0 && rule->action <= ACT_ACTION_TRK_SCMAX) {
/* Note: only the first valid tracking parameter of each
* applies.
*/
if (key && (ts = stktable_get_entry(t, key)))
stream_track_stkctr(&sess->stkctr[tcp_trk_idx(rule->action)], t, ts);
}
- else if (rule->action == TCP_ACT_EXPECT_PX) {
+ else if (rule->action == ACT_TCP_EXPECT_PX) {
conn->flags |= CO_FL_ACCEPT_PROXY;
conn_sock_want_recv(conn);
}
if (strcmp(args[arg], "accept") == 0) {
arg++;
- rule->action = TCP_ACT_ACCEPT;
+ rule->action = ACT_ACTION_ALLOW;
}
else if (strcmp(args[arg], "reject") == 0) {
arg++;
- rule->action = TCP_ACT_REJECT;
+ rule->action = ACT_ACTION_DENY;
}
else if (strcmp(args[arg], "close") == 0) {
arg++;
- rule->action = TCP_ACT_CLOSE;
+ rule->action = ACT_TCP_CLOSE;
}
else {
struct tcp_action_kw *kw;
if (!strcmp(args[arg], "accept")) {
arg++;
- rule->action = TCP_ACT_ACCEPT;
+ rule->action = ACT_ACTION_ALLOW;
}
else if (!strcmp(args[arg], "reject")) {
arg++;
- rule->action = TCP_ACT_REJECT;
+ rule->action = ACT_ACTION_DENY;
}
else if (strcmp(args[arg], "capture") == 0) {
struct sample_expr *expr;
rule->arg.cap.expr = expr;
rule->arg.cap.hdr = hdr;
- rule->action = TCP_ACT_CAPTURE;
+ rule->action = ACT_TCP_CAPTURE;
}
else if (strncmp(args[arg], "track-sc", 8) == 0 &&
args[arg][9] == '\0' && args[arg][8] >= '0' &&
arg++;
}
rule->arg.trk_ctr.expr = expr;
- rule->action = TCP_ACT_TRK_SC0 + args[kw][8] - '0';
+ rule->action = ACT_ACTION_TRK_SC0 + args[kw][8] - '0';
}
else if (strcmp(args[arg], "expect-proxy") == 0) {
if (strcmp(args[arg+1], "layer4") != 0) {
}
arg += 2;
- rule->action = TCP_ACT_EXPECT_PX;
+ rule->action = ACT_TCP_EXPECT_PX;
}
else {
struct tcp_action_kw *kw;