You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

cfg_rcl.cxx 119KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116
  1. /*
  2. * Copyright 2024 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "lua/lua_common.h"
  17. #include "cfg_rcl.h"
  18. #include "rspamd.h"
  19. #include "cfg_file_private.h"
  20. #include "utlist.h"
  21. #include "cfg_file.h"
  22. #include "expression.h"
  23. #include "src/libserver/composites/composites.h"
  24. #include "libserver/worker_util.h"
  25. #include "unix-std.h"
  26. #include "cryptobox.h"
  27. #include "libutil/multipattern.h"
  28. #include "libmime/email_addr.h"
  29. #include "libmime/lang_detection.h"
  30. #include <string>
  31. #include <filesystem>
  32. #include <algorithm>// for std::transform
  33. #include <memory>
  34. #include "contrib/ankerl/unordered_dense.h"
  35. #include "fmt/core.h"
  36. #include "libutil/cxx/util.hxx"
  37. #include "libutil/cxx/file_util.hxx"
  38. #include "frozen/unordered_set.h"
  39. #include "frozen/string.h"
  40. #ifdef HAVE_SYSLOG_H
  41. #include <syslog.h>
  42. #endif
  43. #include <cmath>
  44. struct rspamd_rcl_default_handler_data {
  45. struct rspamd_rcl_struct_parser pd;
  46. std::string key;
  47. rspamd_rcl_default_handler_t handler;
  48. };
  49. struct rspamd_rcl_sections_map;
  50. struct rspamd_rcl_section {
  51. struct rspamd_rcl_sections_map *top{};
  52. std::string name; /**< name of section */
  53. std::optional<std::string> key_attr;
  54. std::optional<std::string> default_key;
  55. rspamd_rcl_handler_t handler{}; /**< handler of section attributes */
  56. enum ucl_type type; /**< type of attribute */
  57. bool required{}; /**< whether this param is required */
  58. bool strict_type{}; /**< whether we need strict type */
  59. mutable bool processed{}; /**< whether this section was processed */
  60. ankerl::unordered_dense::map<std::string, std::shared_ptr<struct rspamd_rcl_section>> subsections;
  61. ankerl::unordered_dense::map<std::string, struct rspamd_rcl_default_handler_data> default_parser; /**< generic parsing fields */
  62. rspamd_rcl_section_fin_t fin{}; /** called at the end of section parsing */
  63. gpointer fin_ud{};
  64. ucl_object_t *doc_ref{}; /**< reference to the section's documentation */
  65. virtual ~rspamd_rcl_section()
  66. {
  67. if (doc_ref) {
  68. ucl_object_unref(doc_ref);
  69. }
  70. }
  71. };
  72. struct rspamd_worker_param_parser {
  73. rspamd_rcl_default_handler_t handler; /**< handler function */
  74. struct rspamd_rcl_struct_parser parser; /**< parser attributes */
  75. };
  76. struct rspamd_worker_cfg_parser {
  77. struct pair_hash {
  78. using is_avalanching = void;
  79. template<class T1, class T2>
  80. std::size_t operator()(const std::pair<T1, T2> &pair) const
  81. {
  82. return ankerl::unordered_dense::hash<T1>()(pair.first) ^ ankerl::unordered_dense::hash<T2>()(pair.second);
  83. }
  84. };
  85. ankerl::unordered_dense::map<std::pair<std::string, gpointer>,
  86. rspamd_worker_param_parser, pair_hash>
  87. parsers; /**< parsers hash */
  88. int type; /**< workers quark */
  89. gboolean (*def_obj_parser)(ucl_object_t *obj, gpointer ud); /**< default object parser */
  90. gpointer def_ud;
  91. };
  92. struct rspamd_rcl_sections_map {
  93. ankerl::unordered_dense::map<std::string, std::shared_ptr<struct rspamd_rcl_section>> sections;
  94. std::vector<std::shared_ptr<struct rspamd_rcl_section>> sections_order;
  95. ankerl::unordered_dense::map<int, struct rspamd_worker_cfg_parser> workers_parser;
  96. ankerl::unordered_dense::set<std::string> lua_modules_seen;
  97. };
  98. static bool rspamd_rcl_process_section(struct rspamd_config *cfg,
  99. const struct rspamd_rcl_section &sec,
  100. gpointer ptr, const ucl_object_t *obj, rspamd_mempool_t *pool,
  101. GError **err);
  102. static bool
  103. rspamd_rcl_section_parse_defaults(struct rspamd_config *cfg,
  104. const struct rspamd_rcl_section &section,
  105. rspamd_mempool_t *pool, const ucl_object_t *obj, gpointer ptr,
  106. GError **err);
  107. /*
  108. * Common section handlers
  109. */
  110. static gboolean
  111. rspamd_rcl_logging_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  112. const char *key, gpointer ud, struct rspamd_rcl_section *section,
  113. GError **err)
  114. {
  115. const ucl_object_t *val;
  116. const char *facility = nullptr, *log_type = nullptr, *log_level = nullptr;
  117. auto *cfg = (struct rspamd_config *) ud;
  118. val = ucl_object_lookup(obj, "type");
  119. if (val != nullptr && ucl_object_tostring_safe(val, &log_type)) {
  120. if (g_ascii_strcasecmp(log_type, "file") == 0) {
  121. /* Need to get filename */
  122. val = ucl_object_lookup(obj, "filename");
  123. if (val == nullptr || val->type != UCL_STRING) {
  124. g_set_error(err,
  125. CFG_RCL_ERROR,
  126. ENOENT,
  127. "filename attribute must be specified for file logging type");
  128. return FALSE;
  129. }
  130. cfg->log_type = RSPAMD_LOG_FILE;
  131. cfg->log_file = rspamd_mempool_strdup(cfg->cfg_pool,
  132. ucl_object_tostring(val));
  133. }
  134. else if (g_ascii_strcasecmp(log_type, "syslog") == 0) {
  135. /* Need to get facility */
  136. #ifdef HAVE_SYSLOG_H
  137. cfg->log_facility = LOG_DAEMON;
  138. cfg->log_type = RSPAMD_LOG_SYSLOG;
  139. val = ucl_object_lookup(obj, "facility");
  140. if (val != nullptr && ucl_object_tostring_safe(val, &facility)) {
  141. if (g_ascii_strcasecmp(facility, "LOG_AUTH") == 0 ||
  142. g_ascii_strcasecmp(facility, "auth") == 0) {
  143. cfg->log_facility = LOG_AUTH;
  144. }
  145. else if (g_ascii_strcasecmp(facility, "LOG_CRON") == 0 ||
  146. g_ascii_strcasecmp(facility, "cron") == 0) {
  147. cfg->log_facility = LOG_CRON;
  148. }
  149. else if (g_ascii_strcasecmp(facility, "LOG_DAEMON") == 0 ||
  150. g_ascii_strcasecmp(facility, "daemon") == 0) {
  151. cfg->log_facility = LOG_DAEMON;
  152. }
  153. else if (g_ascii_strcasecmp(facility, "LOG_MAIL") == 0 ||
  154. g_ascii_strcasecmp(facility, "mail") == 0) {
  155. cfg->log_facility = LOG_MAIL;
  156. }
  157. else if (g_ascii_strcasecmp(facility, "LOG_USER") == 0 ||
  158. g_ascii_strcasecmp(facility, "user") == 0) {
  159. cfg->log_facility = LOG_USER;
  160. }
  161. else if (g_ascii_strcasecmp(facility, "LOG_LOCAL0") == 0 ||
  162. g_ascii_strcasecmp(facility, "local0") == 0) {
  163. cfg->log_facility = LOG_LOCAL0;
  164. }
  165. else if (g_ascii_strcasecmp(facility, "LOG_LOCAL1") == 0 ||
  166. g_ascii_strcasecmp(facility, "local1") == 0) {
  167. cfg->log_facility = LOG_LOCAL1;
  168. }
  169. else if (g_ascii_strcasecmp(facility, "LOG_LOCAL2") == 0 ||
  170. g_ascii_strcasecmp(facility, "local2") == 0) {
  171. cfg->log_facility = LOG_LOCAL2;
  172. }
  173. else if (g_ascii_strcasecmp(facility, "LOG_LOCAL3") == 0 ||
  174. g_ascii_strcasecmp(facility, "local3") == 0) {
  175. cfg->log_facility = LOG_LOCAL3;
  176. }
  177. else if (g_ascii_strcasecmp(facility, "LOG_LOCAL4") == 0 ||
  178. g_ascii_strcasecmp(facility, "local4") == 0) {
  179. cfg->log_facility = LOG_LOCAL4;
  180. }
  181. else if (g_ascii_strcasecmp(facility, "LOG_LOCAL5") == 0 ||
  182. g_ascii_strcasecmp(facility, "local5") == 0) {
  183. cfg->log_facility = LOG_LOCAL5;
  184. }
  185. else if (g_ascii_strcasecmp(facility, "LOG_LOCAL6") == 0 ||
  186. g_ascii_strcasecmp(facility, "local6") == 0) {
  187. cfg->log_facility = LOG_LOCAL6;
  188. }
  189. else if (g_ascii_strcasecmp(facility, "LOG_LOCAL7") == 0 ||
  190. g_ascii_strcasecmp(facility, "local7") == 0) {
  191. cfg->log_facility = LOG_LOCAL7;
  192. }
  193. else {
  194. g_set_error(err,
  195. CFG_RCL_ERROR,
  196. EINVAL,
  197. "invalid log facility: %s",
  198. facility);
  199. return FALSE;
  200. }
  201. }
  202. #endif
  203. }
  204. else if (g_ascii_strcasecmp(log_type,
  205. "stderr") == 0 ||
  206. g_ascii_strcasecmp(log_type, "console") == 0) {
  207. cfg->log_type = RSPAMD_LOG_CONSOLE;
  208. }
  209. else {
  210. g_set_error(err,
  211. CFG_RCL_ERROR,
  212. EINVAL,
  213. "invalid log type: %s",
  214. log_type);
  215. return FALSE;
  216. }
  217. }
  218. else {
  219. /* No type specified */
  220. msg_warn_config(
  221. "logging type is not specified correctly, log output to the console");
  222. }
  223. /* Handle log level */
  224. val = ucl_object_lookup(obj, "level");
  225. if (val != nullptr && ucl_object_tostring_safe(val, &log_level)) {
  226. if (g_ascii_strcasecmp(log_level, "error") == 0) {
  227. cfg->log_level = G_LOG_LEVEL_ERROR | G_LOG_LEVEL_CRITICAL;
  228. }
  229. else if (g_ascii_strcasecmp(log_level, "warning") == 0) {
  230. cfg->log_level = G_LOG_LEVEL_WARNING;
  231. }
  232. else if (g_ascii_strcasecmp(log_level, "info") == 0) {
  233. cfg->log_level = G_LOG_LEVEL_INFO | G_LOG_LEVEL_MESSAGE;
  234. }
  235. else if (g_ascii_strcasecmp(log_level, "message") == 0 ||
  236. g_ascii_strcasecmp(log_level, "notice") == 0) {
  237. cfg->log_level = G_LOG_LEVEL_MESSAGE;
  238. }
  239. else if (g_ascii_strcasecmp(log_level, "silent") == 0) {
  240. cfg->log_level = G_LOG_LEVEL_MESSAGE | G_LOG_LEVEL_INFO;
  241. cfg->log_silent_workers = TRUE;
  242. }
  243. else if (g_ascii_strcasecmp(log_level, "debug") == 0) {
  244. cfg->log_level = G_LOG_LEVEL_DEBUG;
  245. }
  246. else {
  247. g_set_error(err,
  248. CFG_RCL_ERROR,
  249. EINVAL,
  250. "invalid log level: %s",
  251. log_level);
  252. return FALSE;
  253. }
  254. }
  255. /* Handle flags */
  256. val = ucl_object_lookup_any(obj, "color", "log_color", nullptr);
  257. if (val && ucl_object_toboolean(val)) {
  258. cfg->log_flags |= RSPAMD_LOG_FLAG_COLOR;
  259. }
  260. val = ucl_object_lookup_any(obj, "severity", "log_severity", nullptr);
  261. if (val && ucl_object_toboolean(val)) {
  262. cfg->log_flags |= RSPAMD_LOG_FLAG_SEVERITY;
  263. }
  264. val = ucl_object_lookup_any(obj, "systemd", "log_systemd", nullptr);
  265. if (val && ucl_object_toboolean(val)) {
  266. cfg->log_flags |= RSPAMD_LOG_FLAG_SYSTEMD;
  267. }
  268. val = ucl_object_lookup_any(obj, "json", "log_json", nullptr);
  269. if (val && ucl_object_toboolean(val)) {
  270. cfg->log_flags |= RSPAMD_LOG_FLAG_JSON;
  271. }
  272. val = ucl_object_lookup(obj, "log_re_cache");
  273. if (val && ucl_object_toboolean(val)) {
  274. cfg->log_flags |= RSPAMD_LOG_FLAG_RE_CACHE;
  275. }
  276. val = ucl_object_lookup_any(obj, "usec", "log_usec", nullptr);
  277. if (val && ucl_object_toboolean(val)) {
  278. cfg->log_flags |= RSPAMD_LOG_FLAG_USEC;
  279. }
  280. return rspamd_rcl_section_parse_defaults(cfg, *section, cfg->cfg_pool, obj,
  281. (void *) cfg, err);
  282. }
  283. static gboolean
  284. rspamd_rcl_options_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  285. const char *key, gpointer ud,
  286. struct rspamd_rcl_section *section, GError **err)
  287. {
  288. const ucl_object_t *dns, *upstream, *neighbours;
  289. auto *cfg = (struct rspamd_config *) ud;
  290. auto maybe_subsection = rspamd::find_map(section->subsections, "dns");
  291. dns = ucl_object_lookup(obj, "dns");
  292. if (maybe_subsection && dns != nullptr) {
  293. if (!rspamd_rcl_section_parse_defaults(cfg,
  294. *maybe_subsection.value().get(), cfg->cfg_pool, dns,
  295. cfg, err)) {
  296. return FALSE;
  297. }
  298. }
  299. maybe_subsection = rspamd::find_map(section->subsections, "upstream");
  300. upstream = ucl_object_lookup_any(obj, "upstream", "upstreams", nullptr);
  301. if (maybe_subsection && upstream != nullptr) {
  302. if (!rspamd_rcl_section_parse_defaults(cfg,
  303. *maybe_subsection.value().get(), cfg->cfg_pool,
  304. upstream, cfg, err)) {
  305. return FALSE;
  306. }
  307. }
  308. maybe_subsection = rspamd::find_map(section->subsections, "neighbours");
  309. neighbours = ucl_object_lookup(obj, "neighbours");
  310. if (maybe_subsection && neighbours != nullptr) {
  311. const ucl_object_t *cur;
  312. LL_FOREACH(neighbours, cur)
  313. {
  314. if (!rspamd_rcl_process_section(cfg, *maybe_subsection.value().get(), cfg, cur,
  315. pool, err)) {
  316. return FALSE;
  317. }
  318. }
  319. }
  320. const auto *gtube_patterns = ucl_object_lookup(obj, "gtube_patterns");
  321. if (gtube_patterns != nullptr && ucl_object_type(gtube_patterns) == UCL_STRING) {
  322. auto gtube_st = std::string{ucl_object_tostring(gtube_patterns)};
  323. std::transform(gtube_st.begin(), gtube_st.end(), gtube_st.begin(), [](const auto c) -> int {
  324. if (c <= 'Z' && c >= 'A')
  325. return c - ('Z' - 'z');
  326. return c;
  327. });
  328. if (gtube_st == "all") {
  329. cfg->gtube_patterns_policy = RSPAMD_GTUBE_ALL;
  330. }
  331. else if (gtube_st == "reject") {
  332. cfg->gtube_patterns_policy = RSPAMD_GTUBE_REJECT;
  333. }
  334. else if (gtube_st == "disabled" || gtube_st == "disable") {
  335. cfg->gtube_patterns_policy = RSPAMD_GTUBE_DISABLED;
  336. }
  337. else {
  338. g_set_error(err,
  339. CFG_RCL_ERROR,
  340. EINVAL,
  341. "invalid GTUBE patterns policy: %s",
  342. gtube_st.c_str());
  343. return FALSE;
  344. }
  345. }
  346. else if (auto *enable_test_patterns = ucl_object_lookup(obj, "enable_test_patterns"); enable_test_patterns != nullptr) {
  347. /* Legacy setting */
  348. if (!!ucl_object_toboolean(enable_test_patterns)) {
  349. cfg->gtube_patterns_policy = RSPAMD_GTUBE_ALL;
  350. }
  351. }
  352. if (rspamd_rcl_section_parse_defaults(cfg,
  353. *section, cfg->cfg_pool, obj,
  354. cfg, err)) {
  355. /* We need to init this early */
  356. rspamd_multipattern_library_init(cfg->hs_cache_dir);
  357. return TRUE;
  358. }
  359. return FALSE;
  360. }
  361. struct rspamd_rcl_symbol_data {
  362. struct rspamd_symbols_group *gr;
  363. struct rspamd_config *cfg;
  364. };
  365. static gboolean
  366. rspamd_rcl_group_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  367. const char *key, gpointer ud,
  368. struct rspamd_rcl_section *section, GError **err)
  369. {
  370. auto *cfg = static_cast<rspamd_config *>(ud);
  371. g_assert(key != nullptr);
  372. auto *gr = static_cast<rspamd_symbols_group *>(g_hash_table_lookup(cfg->groups, key));
  373. if (gr == nullptr) {
  374. gr = rspamd_config_new_group(cfg, key);
  375. }
  376. if (!rspamd_rcl_section_parse_defaults(cfg, *section, pool, obj,
  377. gr, err)) {
  378. return FALSE;
  379. }
  380. if (const auto *elt = ucl_object_lookup(obj, "one_shot"); elt != nullptr) {
  381. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  382. g_set_error(err,
  383. CFG_RCL_ERROR,
  384. EINVAL,
  385. "one_shot attribute is not boolean for symbol: '%s'",
  386. key);
  387. return FALSE;
  388. }
  389. if (ucl_object_toboolean(elt)) {
  390. gr->flags |= RSPAMD_SYMBOL_GROUP_ONE_SHOT;
  391. }
  392. }
  393. if (const auto *elt = ucl_object_lookup(obj, "disabled"); elt != nullptr) {
  394. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  395. g_set_error(err,
  396. CFG_RCL_ERROR,
  397. EINVAL,
  398. "disabled attribute is not boolean for symbol: '%s'",
  399. key);
  400. return FALSE;
  401. }
  402. if (ucl_object_toboolean(elt)) {
  403. gr->flags |= RSPAMD_SYMBOL_GROUP_DISABLED;
  404. }
  405. }
  406. if (const auto *elt = ucl_object_lookup(obj, "enabled"); elt != nullptr) {
  407. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  408. g_set_error(err,
  409. CFG_RCL_ERROR,
  410. EINVAL,
  411. "enabled attribute is not boolean for symbol: '%s'",
  412. key);
  413. return FALSE;
  414. }
  415. if (!ucl_object_toboolean(elt)) {
  416. gr->flags |= RSPAMD_SYMBOL_GROUP_DISABLED;
  417. }
  418. }
  419. if (const auto *elt = ucl_object_lookup(obj, "public"); elt != nullptr) {
  420. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  421. g_set_error(err,
  422. CFG_RCL_ERROR,
  423. EINVAL,
  424. "public attribute is not boolean for symbol: '%s'",
  425. key);
  426. return FALSE;
  427. }
  428. if (ucl_object_toboolean(elt)) {
  429. gr->flags |= RSPAMD_SYMBOL_GROUP_PUBLIC;
  430. }
  431. }
  432. if (const auto *elt = ucl_object_lookup(obj, "private"); elt != nullptr) {
  433. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  434. g_set_error(err,
  435. CFG_RCL_ERROR,
  436. EINVAL,
  437. "private attribute is not boolean for symbol: '%s'",
  438. key);
  439. return FALSE;
  440. }
  441. if (!ucl_object_toboolean(elt)) {
  442. gr->flags |= RSPAMD_SYMBOL_GROUP_PUBLIC;
  443. }
  444. }
  445. if (const auto *elt = ucl_object_lookup(obj, "description"); elt != nullptr) {
  446. gr->description = rspamd_mempool_strdup(cfg->cfg_pool,
  447. ucl_object_tostring(elt));
  448. }
  449. struct rspamd_rcl_symbol_data sd = {
  450. .gr = gr,
  451. .cfg = cfg,
  452. };
  453. /* Handle symbols */
  454. if (const auto *val = ucl_object_lookup(obj, "symbols"); val != nullptr && ucl_object_type(val) == UCL_OBJECT) {
  455. auto subsection = rspamd::find_map(section->subsections, "symbols");
  456. g_assert(subsection.has_value());
  457. if (!rspamd_rcl_process_section(cfg, *subsection.value().get(), &sd, val,
  458. pool, err)) {
  459. return FALSE;
  460. }
  461. }
  462. return TRUE;
  463. }
  464. static gboolean
  465. rspamd_rcl_symbol_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  466. const char *key, gpointer ud,
  467. struct rspamd_rcl_section *section, GError **err)
  468. {
  469. auto *sd = static_cast<rspamd_rcl_symbol_data *>(ud);
  470. struct rspamd_config *cfg;
  471. const ucl_object_t *elt;
  472. const char *description = nullptr;
  473. double score = NAN;
  474. unsigned int priority = 1, flags = 0;
  475. int nshots = 0;
  476. g_assert(key != nullptr);
  477. cfg = sd->cfg;
  478. if ((elt = ucl_object_lookup(obj, "one_shot")) != nullptr) {
  479. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  480. g_set_error(err,
  481. CFG_RCL_ERROR,
  482. EINVAL,
  483. "one_shot attribute is not boolean for symbol: '%s'",
  484. key);
  485. return FALSE;
  486. }
  487. if (ucl_object_toboolean(elt)) {
  488. nshots = 1;
  489. }
  490. }
  491. if ((elt = ucl_object_lookup(obj, "any_shot")) != nullptr) {
  492. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  493. g_set_error(err,
  494. CFG_RCL_ERROR,
  495. EINVAL,
  496. "any_shot attribute is not boolean for symbol: '%s'",
  497. key);
  498. return FALSE;
  499. }
  500. if (ucl_object_toboolean(elt)) {
  501. nshots = -1;
  502. }
  503. }
  504. if ((elt = ucl_object_lookup(obj, "one_param")) != nullptr) {
  505. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  506. g_set_error(err,
  507. CFG_RCL_ERROR,
  508. EINVAL,
  509. "one_param attribute is not boolean for symbol: '%s'",
  510. key);
  511. return FALSE;
  512. }
  513. if (ucl_object_toboolean(elt)) {
  514. flags |= RSPAMD_SYMBOL_FLAG_ONEPARAM;
  515. }
  516. }
  517. if ((elt = ucl_object_lookup(obj, "ignore")) != nullptr) {
  518. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  519. g_set_error(err,
  520. CFG_RCL_ERROR,
  521. EINVAL,
  522. "ignore attribute is not boolean for symbol: '%s'",
  523. key);
  524. return FALSE;
  525. }
  526. if (ucl_object_toboolean(elt)) {
  527. flags |= RSPAMD_SYMBOL_FLAG_IGNORE_METRIC;
  528. }
  529. }
  530. if ((elt = ucl_object_lookup(obj, "enabled")) != nullptr) {
  531. if (ucl_object_type(elt) != UCL_BOOLEAN) {
  532. g_set_error(err,
  533. CFG_RCL_ERROR,
  534. EINVAL,
  535. "enabled attribute is not boolean for symbol: '%s'",
  536. key);
  537. return FALSE;
  538. }
  539. if (!ucl_object_toboolean(elt)) {
  540. flags |= RSPAMD_SYMBOL_FLAG_DISABLED;
  541. }
  542. }
  543. if ((elt = ucl_object_lookup(obj, "nshots")) != nullptr) {
  544. if (ucl_object_type(elt) != UCL_FLOAT && ucl_object_type(elt) != UCL_INT) {
  545. g_set_error(err,
  546. CFG_RCL_ERROR,
  547. EINVAL,
  548. "nshots attribute is not numeric for symbol: '%s'",
  549. key);
  550. return FALSE;
  551. }
  552. nshots = ucl_object_toint(elt);
  553. }
  554. elt = ucl_object_lookup_any(obj, "score", "weight", nullptr);
  555. if (elt) {
  556. if (ucl_object_type(elt) != UCL_FLOAT && ucl_object_type(elt) != UCL_INT) {
  557. g_set_error(err,
  558. CFG_RCL_ERROR,
  559. EINVAL,
  560. "score attribute is not numeric for symbol: '%s'",
  561. key);
  562. return FALSE;
  563. }
  564. score = ucl_object_todouble(elt);
  565. }
  566. elt = ucl_object_lookup(obj, "priority");
  567. if (elt) {
  568. if (ucl_object_type(elt) != UCL_FLOAT && ucl_object_type(elt) != UCL_INT) {
  569. g_set_error(err,
  570. CFG_RCL_ERROR,
  571. EINVAL,
  572. "priority attribute is not numeric for symbol: '%s'",
  573. key);
  574. return FALSE;
  575. }
  576. priority = ucl_object_toint(elt);
  577. }
  578. else {
  579. priority = ucl_object_get_priority(obj) + 1;
  580. }
  581. elt = ucl_object_lookup(obj, "description");
  582. if (elt) {
  583. description = ucl_object_tostring(elt);
  584. }
  585. if (sd->gr) {
  586. rspamd_config_add_symbol(cfg, key, score,
  587. description, sd->gr->name, flags, priority, nshots);
  588. }
  589. else {
  590. rspamd_config_add_symbol(cfg, key, score,
  591. description, nullptr, flags, priority, nshots);
  592. }
  593. elt = ucl_object_lookup(obj, "groups");
  594. if (elt) {
  595. ucl_object_iter_t gr_it;
  596. const ucl_object_t *cur_gr;
  597. gr_it = ucl_object_iterate_new(elt);
  598. while ((cur_gr = ucl_object_iterate_safe(gr_it, true)) != nullptr) {
  599. rspamd_config_add_symbol_group(cfg, key,
  600. ucl_object_tostring(cur_gr));
  601. }
  602. ucl_object_iterate_free(gr_it);
  603. }
  604. return TRUE;
  605. }
  606. static gboolean
  607. rspamd_rcl_actions_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  608. const char *key, gpointer ud,
  609. struct rspamd_rcl_section *section, GError **err)
  610. {
  611. auto *cfg = static_cast<rspamd_config *>(ud);
  612. const ucl_object_t *cur;
  613. ucl_object_iter_t it;
  614. it = ucl_object_iterate_new(obj);
  615. while ((cur = ucl_object_iterate_safe(it, true)) != nullptr) {
  616. int type = ucl_object_type(cur);
  617. if (type == UCL_NULL) {
  618. rspamd_config_maybe_disable_action(cfg, ucl_object_key(cur),
  619. ucl_object_get_priority(cur));
  620. }
  621. else if (type == UCL_OBJECT || type == UCL_FLOAT || type == UCL_INT) {
  622. /* Exceptions */
  623. auto default_elt = false;
  624. for (const auto &[name, def_elt]: section->default_parser) {
  625. if (def_elt.key == ucl_object_key(cur)) {
  626. default_elt = true;
  627. break;
  628. }
  629. }
  630. if (default_elt) {
  631. continue;
  632. }
  633. /* Something non-default */
  634. if (!rspamd_config_set_action_score(cfg,
  635. ucl_object_key(cur),
  636. cur)) {
  637. g_set_error(err,
  638. CFG_RCL_ERROR,
  639. EINVAL,
  640. "invalid action definition for: '%s'",
  641. ucl_object_key(cur));
  642. ucl_object_iterate_free(it);
  643. return FALSE;
  644. }
  645. }
  646. }
  647. ucl_object_iterate_free(it);
  648. return rspamd_rcl_section_parse_defaults(cfg, *section, pool, obj, cfg, err);
  649. }
  650. constexpr const auto known_worker_attributes = frozen::make_unordered_set<frozen::string>({
  651. "bind_socket",
  652. "listen",
  653. "bind",
  654. "count",
  655. "max_files",
  656. "max_core",
  657. "enabled",
  658. });
  659. static gboolean
  660. rspamd_rcl_worker_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  661. const char *key, gpointer ud,
  662. struct rspamd_rcl_section *section, GError **err)
  663. {
  664. auto *cfg = static_cast<rspamd_config *>(ud);
  665. g_assert(key != nullptr);
  666. const auto *worker_type = key;
  667. auto qtype = g_quark_try_string(worker_type);
  668. if (qtype == 0) {
  669. msg_err_config("unknown worker type: %s", worker_type);
  670. return FALSE;
  671. }
  672. auto *wrk = rspamd_config_new_worker(cfg, nullptr);
  673. wrk->options = ucl_object_copy(obj);
  674. wrk->worker = rspamd_get_worker_by_type(cfg, qtype);
  675. if (wrk->worker == nullptr) {
  676. g_set_error(err,
  677. CFG_RCL_ERROR,
  678. EINVAL,
  679. "unknown worker type: %s",
  680. worker_type);
  681. return FALSE;
  682. }
  683. wrk->type = qtype;
  684. if (wrk->worker->worker_init_func) {
  685. wrk->ctx = wrk->worker->worker_init_func(cfg);
  686. }
  687. const auto *val = ucl_object_lookup_any(obj, "bind_socket", "listen", "bind", nullptr);
  688. /* This name is more logical */
  689. if (val != nullptr) {
  690. auto it = ucl_object_iterate_new(val);
  691. const ucl_object_t *cur;
  692. const char *worker_bind = nullptr;
  693. while ((cur = ucl_object_iterate_safe(it, true)) != nullptr) {
  694. if (!ucl_object_tostring_safe(cur, &worker_bind)) {
  695. continue;
  696. }
  697. if (!rspamd_parse_bind_line(cfg, wrk, worker_bind)) {
  698. g_set_error(err,
  699. CFG_RCL_ERROR,
  700. EINVAL,
  701. "cannot parse bind line: %s",
  702. worker_bind);
  703. ucl_object_iterate_free(it);
  704. return FALSE;
  705. }
  706. }
  707. ucl_object_iterate_free(it);
  708. }
  709. if (!rspamd_rcl_section_parse_defaults(cfg, *section, cfg->cfg_pool, obj,
  710. wrk, err)) {
  711. return FALSE;
  712. }
  713. /* Parse other attributes */
  714. auto maybe_wparser = rspamd::find_map(section->top->workers_parser, wrk->type);
  715. if (maybe_wparser && obj->type == UCL_OBJECT) {
  716. auto &wparser = maybe_wparser.value().get();
  717. auto it = ucl_object_iterate_new(obj);
  718. const ucl_object_t *cur;
  719. while ((cur = ucl_object_iterate_full(it, UCL_ITERATE_EXPLICIT)) != nullptr) {
  720. auto srch = std::make_pair(ucl_object_key(cur), (gpointer) wrk->ctx);
  721. auto maybe_specific = rspamd::find_map(wparser.parsers, srch);
  722. if (maybe_specific) {
  723. auto &whandler = maybe_specific.value().get();
  724. const ucl_object_t *cur_obj;
  725. LL_FOREACH(cur, cur_obj)
  726. {
  727. if (!whandler.handler(cfg->cfg_pool,
  728. cur_obj,
  729. (void *) &whandler.parser,
  730. section,
  731. err)) {
  732. ucl_object_iterate_free(it);
  733. return FALSE;
  734. }
  735. if (!(whandler.parser.flags & RSPAMD_CL_FLAG_MULTIPLE)) {
  736. break;
  737. }
  738. }
  739. }
  740. else if (!(wrk->worker->flags & RSPAMD_WORKER_NO_STRICT_CONFIG) &&
  741. known_worker_attributes.find(std::string_view{ucl_object_key(cur)}) == known_worker_attributes.end()) {
  742. msg_warn_config("unknown worker attribute: %s; worker type: %s", ucl_object_key(cur), worker_type);
  743. }
  744. }
  745. ucl_object_iterate_free(it);
  746. if (wparser.def_obj_parser != nullptr) {
  747. auto *robj = ucl_object_ref(obj);
  748. if (!wparser.def_obj_parser(robj, wparser.def_ud)) {
  749. ucl_object_unref(robj);
  750. return FALSE;
  751. }
  752. ucl_object_unref(robj);
  753. }
  754. }
  755. cfg->workers = g_list_prepend(cfg->workers, wrk);
  756. return TRUE;
  757. }
  758. static gboolean
  759. rspamd_rcl_lua_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  760. const char *key, gpointer ud,
  761. struct rspamd_rcl_section *section, GError **err)
  762. {
  763. namespace fs = std::filesystem;
  764. auto *cfg = static_cast<rspamd_config *>(ud);
  765. auto lua_src = fs::path{ucl_object_tostring(obj)};
  766. auto *L = RSPAMD_LUA_CFG_STATE(cfg);
  767. std::error_code ec1;
  768. auto lua_dir = fs::weakly_canonical(lua_src.parent_path(), ec1);
  769. auto lua_file = lua_src.filename();
  770. if (!ec1 && !lua_dir.empty() && !lua_file.empty()) {
  771. auto cur_dir = fs::current_path(ec1);
  772. if (!ec1 && !cur_dir.empty() && ::chdir(lua_dir.c_str()) != -1) {
  773. /* Push traceback function */
  774. lua_pushcfunction(L, &rspamd_lua_traceback);
  775. auto err_idx = lua_gettop(L);
  776. /* Load file */
  777. if (luaL_loadfile(L, lua_file.c_str()) != 0) {
  778. g_set_error(err,
  779. CFG_RCL_ERROR,
  780. EINVAL,
  781. "cannot load lua file %s: %s",
  782. lua_src.c_str(),
  783. lua_tostring(L, -1));
  784. if (::chdir(cur_dir.c_str()) == -1) {
  785. msg_err_config("cannot chdir to %s: %s", cur_dir.c_str(),
  786. strerror(errno));
  787. }
  788. return FALSE;
  789. }
  790. /* Now do it */
  791. if (lua_pcall(L, 0, 0, err_idx) != 0) {
  792. g_set_error(err,
  793. CFG_RCL_ERROR,
  794. EINVAL,
  795. "cannot init lua file %s: %s",
  796. lua_src.c_str(),
  797. lua_tostring(L, -1));
  798. lua_settop(L, 0);
  799. if (::chdir(cur_dir.c_str()) == -1) {
  800. msg_err_config("cannot chdir to %s: %s", cur_dir.c_str(),
  801. strerror(errno));
  802. }
  803. return FALSE;
  804. }
  805. lua_pop(L, 1);
  806. }
  807. else {
  808. g_set_error(err, CFG_RCL_ERROR, ENOENT, "cannot chdir to %s: %s",
  809. lua_dir.c_str(), strerror(errno));
  810. if (::chdir(cur_dir.c_str()) == -1) {
  811. msg_err_config("cannot chdir back to %s: %s", cur_dir.c_str(), strerror(errno));
  812. }
  813. return FALSE;
  814. }
  815. if (::chdir(cur_dir.c_str()) == -1) {
  816. msg_err_config("cannot chdir back to %s: %s", cur_dir.c_str(), strerror(errno));
  817. }
  818. }
  819. else {
  820. g_set_error(err, CFG_RCL_ERROR, ENOENT, "cannot find to %s: %s",
  821. lua_src.c_str(), strerror(errno));
  822. return FALSE;
  823. }
  824. return TRUE;
  825. }
  826. static int
  827. rspamd_lua_mod_sort_fn(gconstpointer a, gconstpointer b)
  828. {
  829. auto *m1 = *(const script_module **) a;
  830. auto *m2 = *(const script_module **) b;
  831. return strcmp(m1->name, m2->name);
  832. }
  833. gboolean
  834. rspamd_rcl_add_lua_plugins_path(struct rspamd_rcl_sections_map *sections,
  835. struct rspamd_config *cfg,
  836. const char *path,
  837. gboolean main_path,
  838. GError **err)
  839. {
  840. namespace fs = std::filesystem;
  841. auto dir = fs::path{path};
  842. std::error_code ec;
  843. auto add_single_file = [&](const fs::path &fpath) -> bool {
  844. auto fname = fpath.filename();
  845. auto modname = fname.string();
  846. if (fname.has_extension()) {
  847. modname = modname.substr(0, modname.size() - fname.extension().native().size());
  848. }
  849. auto *cur_mod = rspamd_mempool_alloc_type(cfg->cfg_pool,
  850. struct script_module);
  851. cur_mod->path = rspamd_mempool_strdup(cfg->cfg_pool, fpath.c_str());
  852. cur_mod->name = rspamd_mempool_strdup(cfg->cfg_pool, modname.c_str());
  853. if (sections->lua_modules_seen.contains(modname)) {
  854. msg_info_config("already seen module %s, skip %s",
  855. cur_mod->name, cur_mod->path);
  856. return false;
  857. }
  858. g_ptr_array_add(cfg->script_modules, cur_mod);
  859. sections->lua_modules_seen.insert(fname.string());
  860. return true;
  861. };
  862. if (fs::is_regular_file(dir, ec) && dir.has_extension() && dir.extension() == ".lua") {
  863. add_single_file(dir);
  864. }
  865. else if (!fs::is_directory(dir, ec)) {
  866. if (!fs::exists(dir) && !main_path) {
  867. msg_debug_config("optional plugins path %s is absent, skip it", path);
  868. return TRUE;
  869. }
  870. g_set_error(err,
  871. CFG_RCL_ERROR,
  872. errno,
  873. "invalid lua path spec %s, %s",
  874. path,
  875. ec.message().c_str());
  876. return FALSE;
  877. }
  878. else {
  879. /* Handle directory */
  880. for (const auto &p: fs::recursive_directory_iterator(dir, ec)) {
  881. auto fpath = p.path().string();
  882. if (p.is_regular_file() && fpath.ends_with(".lua")) {
  883. add_single_file(p.path());
  884. }
  885. }
  886. }
  887. g_ptr_array_sort(cfg->script_modules, rspamd_lua_mod_sort_fn);
  888. return TRUE;
  889. }
  890. static gboolean
  891. rspamd_rcl_modules_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  892. const char *key, gpointer ud,
  893. struct rspamd_rcl_section *section, GError **err)
  894. {
  895. auto *cfg = static_cast<rspamd_config *>(ud);
  896. const char *data;
  897. if (obj->type == UCL_OBJECT) {
  898. const auto *val = ucl_object_lookup(obj, "path");
  899. if (val) {
  900. const auto *cur = val;
  901. LL_FOREACH(val, cur)
  902. {
  903. if (ucl_object_tostring_safe(cur, &data)) {
  904. if (!rspamd_rcl_add_lua_plugins_path(section->top,
  905. cfg,
  906. data,
  907. TRUE,
  908. err)) {
  909. return FALSE;
  910. }
  911. }
  912. }
  913. }
  914. else {
  915. g_set_error(err,
  916. CFG_RCL_ERROR,
  917. EINVAL,
  918. "path attribute is missing");
  919. return FALSE;
  920. }
  921. val = ucl_object_lookup(obj, "fallback_path");
  922. if (val) {
  923. const auto *cur = val;
  924. LL_FOREACH(val, cur)
  925. {
  926. if (ucl_object_tostring_safe(cur, &data)) {
  927. if (!rspamd_rcl_add_lua_plugins_path(section->top,
  928. cfg,
  929. data,
  930. FALSE,
  931. err)) {
  932. return FALSE;
  933. }
  934. }
  935. }
  936. }
  937. val = ucl_object_lookup(obj, "try_path");
  938. if (val) {
  939. const auto *cur = val;
  940. LL_FOREACH(val, cur)
  941. {
  942. if (ucl_object_tostring_safe(cur, &data)) {
  943. if (!rspamd_rcl_add_lua_plugins_path(section->top,
  944. cfg,
  945. data,
  946. FALSE,
  947. err)) {
  948. return FALSE;
  949. }
  950. }
  951. }
  952. }
  953. }
  954. else if (ucl_object_tostring_safe(obj, &data)) {
  955. if (!rspamd_rcl_add_lua_plugins_path(section->top, cfg, data, TRUE, err)) {
  956. return FALSE;
  957. }
  958. }
  959. else {
  960. g_set_error(err,
  961. CFG_RCL_ERROR,
  962. EINVAL,
  963. "module parameter has wrong type (must be an object or a string)");
  964. return FALSE;
  965. }
  966. return TRUE;
  967. }
  968. struct statfile_parser_data {
  969. struct rspamd_config *cfg;
  970. struct rspamd_classifier_config *ccf;
  971. };
  972. static gboolean
  973. rspamd_rcl_statfile_handler(rspamd_mempool_t *pool, const ucl_object_t *obj,
  974. const char *key, gpointer ud,
  975. struct rspamd_rcl_section *section, GError **err)
  976. {
  977. auto *stud = (struct statfile_parser_data *) ud;
  978. GList *labels;
  979. g_assert(key != nullptr);
  980. auto *cfg = stud->cfg;
  981. auto *ccf = stud->ccf;
  982. auto *st = rspamd_config_new_statfile(cfg, nullptr);
  983. st->symbol = rspamd_mempool_strdup(cfg->cfg_pool, key);
  984. if (rspamd_rcl_section_parse_defaults(cfg, *section, pool, obj, st, err)) {
  985. ccf->statfiles = rspamd_mempool_glist_prepend(pool, ccf->statfiles, st);
  986. if (st->label != nullptr) {
  987. labels = (GList *) g_hash_table_lookup(ccf->labels, st->label);
  988. if (labels != nullptr) {
  989. /* Must use append to preserve the head stored in the hash table */
  990. labels = g_list_append(labels, st);
  991. }
  992. else {
  993. g_hash_table_insert(ccf->labels, st->label,
  994. g_list_prepend(nullptr, st));
  995. }
  996. }
  997. if (st->symbol != nullptr) {
  998. g_hash_table_insert(cfg->classifiers_symbols, st->symbol, st);
  999. }
  1000. else {
  1001. g_set_error(err,
  1002. CFG_RCL_ERROR,
  1003. EINVAL,
  1004. "statfile must have a symbol defined");
  1005. return FALSE;
  1006. }
  1007. st->opts = (ucl_object_t *) obj;
  1008. st->clcf = ccf;
  1009. const auto *val = ucl_object_lookup(obj, "spam");
  1010. if (val == nullptr) {
  1011. msg_info_config(
  1012. "statfile %s has no explicit 'spam' setting, trying to guess by symbol",
  1013. st->symbol);
  1014. if (rspamd_substring_search_caseless(st->symbol,
  1015. strlen(st->symbol), "spam", 4) != -1) {
  1016. st->is_spam = TRUE;
  1017. }
  1018. else if (rspamd_substring_search_caseless(st->symbol,
  1019. strlen(st->symbol), "ham", 3) != -1) {
  1020. st->is_spam = FALSE;
  1021. }
  1022. else {
  1023. g_set_error(err,
  1024. CFG_RCL_ERROR,
  1025. EINVAL,
  1026. "cannot guess spam setting from %s",
  1027. st->symbol);
  1028. return FALSE;
  1029. }
  1030. msg_info_config("guessed that statfile with symbol %s is %s",
  1031. st->symbol,
  1032. st->is_spam ? "spam" : "ham");
  1033. }
  1034. return TRUE;
  1035. }
  1036. return FALSE;
  1037. }
  1038. static gboolean
  1039. rspamd_rcl_classifier_handler(rspamd_mempool_t *pool,
  1040. const ucl_object_t *obj,
  1041. const char *key,
  1042. gpointer ud,
  1043. struct rspamd_rcl_section *section,
  1044. GError **err)
  1045. {
  1046. auto *cfg = static_cast<rspamd_config *>(ud);
  1047. g_assert(key != nullptr);
  1048. auto *ccf = rspamd_config_new_classifier(cfg, nullptr);
  1049. auto *tkcf = (rspamd_tokenizer_config *) nullptr;
  1050. ccf->classifier = rspamd_mempool_strdup(cfg->cfg_pool, key);
  1051. if (rspamd_rcl_section_parse_defaults(cfg, *section, cfg->cfg_pool, obj,
  1052. ccf, err)) {
  1053. auto stat_section = rspamd::find_map(section->subsections, "statfile");
  1054. if (ccf->classifier == nullptr) {
  1055. ccf->classifier = rspamd_mempool_strdup(cfg->cfg_pool, "bayes");
  1056. }
  1057. if (ccf->name == nullptr) {
  1058. ccf->name = ccf->classifier;
  1059. }
  1060. auto it = ucl_object_iterate_new(obj);
  1061. const auto *val = obj;
  1062. auto res = TRUE;
  1063. while ((val = ucl_object_iterate_safe(it, true)) != nullptr && res) {
  1064. const auto *st_key = ucl_object_key(val);
  1065. if (st_key != nullptr) {
  1066. if (g_ascii_strcasecmp(st_key, "statfile") == 0) {
  1067. const auto *cur = val;
  1068. LL_FOREACH(val, cur)
  1069. {
  1070. struct statfile_parser_data stud = {.cfg = cfg, .ccf = ccf};
  1071. res = rspamd_rcl_process_section(cfg, *stat_section.value().get(), &stud,
  1072. cur, cfg->cfg_pool, err);
  1073. if (!res) {
  1074. ucl_object_iterate_free(it);
  1075. return FALSE;
  1076. }
  1077. }
  1078. }
  1079. else if (g_ascii_strcasecmp(st_key, "tokenizer") == 0) {
  1080. tkcf = rspamd_mempool_alloc0_type(cfg->cfg_pool, rspamd_tokenizer_config);
  1081. if (ucl_object_type(val) == UCL_STRING) {
  1082. tkcf->name = ucl_object_tostring(val);
  1083. }
  1084. else if (ucl_object_type(val) == UCL_OBJECT) {
  1085. const auto *cur = ucl_object_lookup(val, "name");
  1086. if (cur != nullptr) {
  1087. tkcf->name = ucl_object_tostring(cur);
  1088. tkcf->opts = val;
  1089. }
  1090. else {
  1091. cur = ucl_object_lookup(val, "type");
  1092. if (cur != nullptr) {
  1093. tkcf->name = ucl_object_tostring(cur);
  1094. tkcf->opts = val;
  1095. }
  1096. }
  1097. }
  1098. }
  1099. }
  1100. }
  1101. ucl_object_iterate_free(it);
  1102. }
  1103. else {
  1104. msg_err_config("fatal configuration error, cannot parse statfile definition");
  1105. }
  1106. if (tkcf == nullptr) {
  1107. tkcf = rspamd_mempool_alloc0_type(cfg->cfg_pool, rspamd_tokenizer_config);
  1108. tkcf->name = nullptr;
  1109. }
  1110. ccf->tokenizer = tkcf;
  1111. /* Handle lua conditions */
  1112. const auto *val = ucl_object_lookup_any(obj, "learn_condition", nullptr);
  1113. if (val) {
  1114. const auto *cur = val;
  1115. LL_FOREACH(val, cur)
  1116. {
  1117. if (ucl_object_type(cur) == UCL_STRING) {
  1118. const char *lua_script;
  1119. gsize slen;
  1120. int ref_idx;
  1121. lua_script = ucl_object_tolstring(cur, &slen);
  1122. ref_idx = rspamd_lua_function_ref_from_str(RSPAMD_LUA_CFG_STATE(cfg),
  1123. lua_script, slen, "learn_condition", err);
  1124. if (ref_idx == LUA_NOREF) {
  1125. return FALSE;
  1126. }
  1127. rspamd_lua_add_ref_dtor(RSPAMD_LUA_CFG_STATE(cfg), cfg->cfg_pool, ref_idx);
  1128. ccf->learn_conditions = rspamd_mempool_glist_append(
  1129. cfg->cfg_pool,
  1130. ccf->learn_conditions,
  1131. GINT_TO_POINTER(ref_idx));
  1132. }
  1133. }
  1134. }
  1135. val = ucl_object_lookup_any(obj, "classify_condition", nullptr);
  1136. if (val) {
  1137. const auto *cur = val;
  1138. LL_FOREACH(val, cur)
  1139. {
  1140. if (ucl_object_type(cur) == UCL_STRING) {
  1141. const char *lua_script;
  1142. gsize slen;
  1143. int ref_idx;
  1144. lua_script = ucl_object_tolstring(cur, &slen);
  1145. ref_idx = rspamd_lua_function_ref_from_str(RSPAMD_LUA_CFG_STATE(cfg),
  1146. lua_script, slen, "classify_condition", err);
  1147. if (ref_idx == LUA_NOREF) {
  1148. return FALSE;
  1149. }
  1150. rspamd_lua_add_ref_dtor(RSPAMD_LUA_CFG_STATE(cfg), cfg->cfg_pool, ref_idx);
  1151. ccf->classify_conditions = rspamd_mempool_glist_append(
  1152. cfg->cfg_pool,
  1153. ccf->classify_conditions,
  1154. GINT_TO_POINTER(ref_idx));
  1155. }
  1156. }
  1157. }
  1158. ccf->opts = (ucl_object_t *) obj;
  1159. cfg->classifiers = g_list_prepend(cfg->classifiers, ccf);
  1160. return TRUE;
  1161. }
  1162. static gboolean
  1163. rspamd_rcl_composite_handler(rspamd_mempool_t *pool,
  1164. const ucl_object_t *obj,
  1165. const char *key,
  1166. gpointer ud,
  1167. struct rspamd_rcl_section *section,
  1168. GError **err)
  1169. {
  1170. auto *cfg = static_cast<rspamd_config *>(ud);
  1171. void *composite;
  1172. const char *composite_name;
  1173. g_assert(key != nullptr);
  1174. composite_name = key;
  1175. const auto *val = ucl_object_lookup(obj, "enabled");
  1176. if (val != nullptr && !ucl_object_toboolean(val)) {
  1177. msg_info_config("composite %s is disabled", composite_name);
  1178. return TRUE;
  1179. }
  1180. if ((composite = rspamd_composites_manager_add_from_ucl(cfg->composites_manager,
  1181. composite_name, obj)) != nullptr) {
  1182. rspamd_symcache_add_symbol(cfg->cache, composite_name, 0,
  1183. nullptr, composite, SYMBOL_TYPE_COMPOSITE, -1);
  1184. }
  1185. return composite != nullptr;
  1186. }
  1187. static gboolean
  1188. rspamd_rcl_composites_handler(rspamd_mempool_t *pool,
  1189. const ucl_object_t *obj,
  1190. const char *key,
  1191. gpointer ud,
  1192. struct rspamd_rcl_section *section,
  1193. GError **err)
  1194. {
  1195. auto success = TRUE;
  1196. auto it = ucl_object_iterate_new(obj);
  1197. const auto *cur = obj;
  1198. while ((cur = ucl_object_iterate_safe(it, true))) {
  1199. success = rspamd_rcl_composite_handler(pool, cur,
  1200. ucl_object_key(cur), ud, section, err);
  1201. if (!success) {
  1202. break;
  1203. }
  1204. }
  1205. ucl_object_iterate_free(it);
  1206. return success;
  1207. }
  1208. static gboolean
  1209. rspamd_rcl_neighbours_handler(rspamd_mempool_t *pool,
  1210. const ucl_object_t *obj,
  1211. const char *key,
  1212. gpointer ud,
  1213. struct rspamd_rcl_section *section,
  1214. GError **err)
  1215. {
  1216. auto *cfg = static_cast<rspamd_config *>(ud);
  1217. auto has_port = FALSE, has_proto = FALSE;
  1218. const char *p;
  1219. if (key == nullptr) {
  1220. g_set_error(err,
  1221. CFG_RCL_ERROR,
  1222. EINVAL,
  1223. "missing name for neighbour");
  1224. return FALSE;
  1225. }
  1226. const auto *hostval = ucl_object_lookup(obj, "host");
  1227. if (hostval == nullptr || ucl_object_type(hostval) != UCL_STRING) {
  1228. g_set_error(err,
  1229. CFG_RCL_ERROR,
  1230. EINVAL,
  1231. "missing host for neighbour: %s", ucl_object_key(obj));
  1232. return FALSE;
  1233. }
  1234. auto *neigh = ucl_object_typed_new(UCL_OBJECT);
  1235. ucl_object_insert_key(neigh, ucl_object_copy(hostval), "host", 0, false);
  1236. if ((p = strrchr(ucl_object_tostring(hostval), ':')) != nullptr) {
  1237. if (g_ascii_isdigit(p[1])) {
  1238. has_port = TRUE;
  1239. }
  1240. }
  1241. if (strstr(ucl_object_tostring(hostval), "://") != nullptr) {
  1242. has_proto = TRUE;
  1243. }
  1244. /* Now make url */
  1245. auto urlstr = std::string{};
  1246. const auto *pathval = ucl_object_lookup(obj, "path");
  1247. if (!has_proto) {
  1248. urlstr += "http://";
  1249. }
  1250. urlstr += ucl_object_tostring(hostval);
  1251. if (!has_port) {
  1252. urlstr += ":11334";
  1253. }
  1254. if (pathval == nullptr) {
  1255. urlstr += "/";
  1256. }
  1257. else {
  1258. urlstr += ucl_object_tostring(pathval);
  1259. }
  1260. ucl_object_insert_key(neigh,
  1261. ucl_object_fromlstring(urlstr.data(), urlstr.size()),
  1262. "url", 0, false);
  1263. ucl_object_insert_key(cfg->neighbours, neigh, key, 0, true);
  1264. return TRUE;
  1265. }
  1266. struct rspamd_rcl_section *
  1267. rspamd_rcl_add_section(struct rspamd_rcl_sections_map **top,
  1268. struct rspamd_rcl_section *parent_section,
  1269. const char *name, const char *key_attr, rspamd_rcl_handler_t handler,
  1270. enum ucl_type type, gboolean required, gboolean strict_type)
  1271. {
  1272. return rspamd_rcl_add_section_doc(top, parent_section, name, key_attr, handler,
  1273. type, required, strict_type, nullptr, nullptr);
  1274. }
  1275. struct rspamd_rcl_section *
  1276. rspamd_rcl_add_section_doc(struct rspamd_rcl_sections_map **top,
  1277. struct rspamd_rcl_section *parent_section,
  1278. const char *name, const char *key_attr, rspamd_rcl_handler_t handler,
  1279. enum ucl_type type, gboolean required, gboolean strict_type,
  1280. ucl_object_t *doc_target,
  1281. const char *doc_string)
  1282. {
  1283. if (top == nullptr) {
  1284. g_error("invalid arguments to rspamd_rcl_add_section");
  1285. return nullptr;
  1286. }
  1287. if (*top == nullptr) {
  1288. *top = new rspamd_rcl_sections_map;
  1289. }
  1290. auto fill_section = [&](struct rspamd_rcl_section *section) {
  1291. section->name = name;
  1292. if (key_attr) {
  1293. section->key_attr = std::string{key_attr};
  1294. }
  1295. section->handler = handler;
  1296. section->type = type;
  1297. section->strict_type = strict_type;
  1298. if (doc_target == nullptr) {
  1299. if (parent_section && parent_section->doc_ref) {
  1300. section->doc_ref = ucl_object_ref(rspamd_rcl_add_doc_obj(parent_section->doc_ref,
  1301. doc_string,
  1302. name,
  1303. type,
  1304. nullptr,
  1305. 0,
  1306. nullptr,
  1307. 0));
  1308. }
  1309. else {
  1310. section->doc_ref = nullptr;
  1311. }
  1312. }
  1313. else {
  1314. section->doc_ref = ucl_object_ref(rspamd_rcl_add_doc_obj(doc_target,
  1315. doc_string,
  1316. name,
  1317. type,
  1318. nullptr,
  1319. 0,
  1320. nullptr,
  1321. 0));
  1322. }
  1323. section->top = *top;
  1324. };
  1325. /* Select the appropriate container and insert section inside it */
  1326. if (parent_section) {
  1327. auto it = parent_section->subsections.insert(std::make_pair(std::string{name},
  1328. std::make_shared<rspamd_rcl_section>()));
  1329. if (!it.second) {
  1330. g_error("invalid arguments to rspamd_rcl_add_section");
  1331. return nullptr;
  1332. }
  1333. fill_section(it.first->second.get());
  1334. return it.first->second.get();
  1335. }
  1336. else {
  1337. auto it = (*top)->sections.insert(std::make_pair(std::string{name},
  1338. std::make_shared<rspamd_rcl_section>()));
  1339. if (!it.second) {
  1340. g_error("invalid arguments to rspamd_rcl_add_section");
  1341. return nullptr;
  1342. }
  1343. (*top)->sections_order.push_back(it.first->second);
  1344. fill_section(it.first->second.get());
  1345. return it.first->second.get();
  1346. }
  1347. }
  1348. struct rspamd_rcl_default_handler_data *
  1349. rspamd_rcl_add_default_handler(struct rspamd_rcl_section *section,
  1350. const char *name,
  1351. rspamd_rcl_default_handler_t handler,
  1352. goffset offset,
  1353. int flags,
  1354. const char *doc_string)
  1355. {
  1356. auto it = section->default_parser.emplace(std::make_pair(std::string{name}, rspamd_rcl_default_handler_data{}));
  1357. auto &nhandler = it.first->second;
  1358. nhandler.key = name;
  1359. nhandler.handler = handler;
  1360. nhandler.pd.offset = offset;
  1361. nhandler.pd.flags = flags;
  1362. if (section->doc_ref != nullptr) {
  1363. rspamd_rcl_add_doc_obj(section->doc_ref,
  1364. doc_string,
  1365. name,
  1366. UCL_NULL,
  1367. handler,
  1368. flags,
  1369. nullptr,
  1370. 0);
  1371. }
  1372. return &nhandler;
  1373. }
  1374. struct rspamd_rcl_sections_map *
  1375. rspamd_rcl_config_init(struct rspamd_config *cfg, GHashTable *skip_sections)
  1376. {
  1377. auto *top = new rspamd_rcl_sections_map;
  1378. /*
  1379. * Important notice:
  1380. * the order of parsing is equal to order of this initialization, therefore
  1381. * it is possible to init some portions of config prior to others
  1382. */
  1383. /**
  1384. * Logging section
  1385. */
  1386. if (!(skip_sections && g_hash_table_lookup(skip_sections, "logging"))) {
  1387. auto *sub = rspamd_rcl_add_section_doc(&top, nullptr,
  1388. "logging", nullptr,
  1389. rspamd_rcl_logging_handler,
  1390. UCL_OBJECT,
  1391. FALSE,
  1392. TRUE,
  1393. cfg->doc_strings,
  1394. "Configure rspamd logging");
  1395. /* Default handlers */
  1396. rspamd_rcl_add_default_handler(sub,
  1397. "log_buffer",
  1398. rspamd_rcl_parse_struct_integer,
  1399. G_STRUCT_OFFSET(struct rspamd_config, log_buf_size),
  1400. RSPAMD_CL_FLAG_INT_32,
  1401. "Size of log buffer in bytes (for file logging)");
  1402. rspamd_rcl_add_default_handler(sub,
  1403. "log_urls",
  1404. rspamd_rcl_parse_struct_boolean,
  1405. G_STRUCT_OFFSET(struct rspamd_config, log_urls),
  1406. 0,
  1407. "Write each URL found in a message to the log file");
  1408. rspamd_rcl_add_default_handler(sub,
  1409. "debug_ip",
  1410. rspamd_rcl_parse_struct_ucl,
  1411. G_STRUCT_OFFSET(struct rspamd_config, debug_ip_map),
  1412. 0,
  1413. "Enable debugging log for the specified IP addresses");
  1414. rspamd_rcl_add_default_handler(sub,
  1415. "debug_modules",
  1416. rspamd_rcl_parse_struct_string_list,
  1417. G_STRUCT_OFFSET(struct rspamd_config, debug_modules),
  1418. RSPAMD_CL_FLAG_STRING_LIST_HASH,
  1419. "Enable debugging for the specified modules");
  1420. rspamd_rcl_add_default_handler(sub,
  1421. "log_format",
  1422. rspamd_rcl_parse_struct_string,
  1423. G_STRUCT_OFFSET(struct rspamd_config, log_format_str),
  1424. 0,
  1425. "Specify format string for the task logging output "
  1426. "(https://rspamd.com/doc/configuration/logging.html "
  1427. "for details)");
  1428. rspamd_rcl_add_default_handler(sub,
  1429. "encryption_key",
  1430. rspamd_rcl_parse_struct_pubkey,
  1431. G_STRUCT_OFFSET(struct rspamd_config, log_encryption_key),
  1432. 0,
  1433. "Encrypt sensitive information in logs using this pubkey");
  1434. rspamd_rcl_add_default_handler(sub,
  1435. "error_elts",
  1436. rspamd_rcl_parse_struct_integer,
  1437. G_STRUCT_OFFSET(struct rspamd_config, log_error_elts),
  1438. RSPAMD_CL_FLAG_UINT,
  1439. "Size of circular buffer for last errors (10 by default)");
  1440. rspamd_rcl_add_default_handler(sub,
  1441. "error_maxlen",
  1442. rspamd_rcl_parse_struct_integer,
  1443. G_STRUCT_OFFSET(struct rspamd_config, log_error_elt_maxlen),
  1444. RSPAMD_CL_FLAG_UINT,
  1445. "Size of each element in error log buffer (1000 by default)");
  1446. rspamd_rcl_add_default_handler(sub,
  1447. "task_max_elts",
  1448. rspamd_rcl_parse_struct_integer,
  1449. G_STRUCT_OFFSET(struct rspamd_config, log_task_max_elts),
  1450. RSPAMD_CL_FLAG_UINT,
  1451. "Maximum number of elements in task log entry (7 by default)");
  1452. /* Documentation only options, handled in log_handler to map flags */
  1453. rspamd_rcl_add_doc_by_path(cfg,
  1454. "logging",
  1455. "Enable colored output (for console logging)",
  1456. "log_color",
  1457. UCL_BOOLEAN,
  1458. nullptr,
  1459. 0,
  1460. nullptr,
  1461. 0);
  1462. rspamd_rcl_add_doc_by_path(cfg,
  1463. "logging",
  1464. "Enable severity logging output (e.g. [error] or [warning])",
  1465. "log_severity",
  1466. UCL_BOOLEAN,
  1467. nullptr,
  1468. 0,
  1469. nullptr,
  1470. 0);
  1471. rspamd_rcl_add_doc_by_path(cfg,
  1472. "logging",
  1473. "Enable systemd compatible logging",
  1474. "systemd",
  1475. UCL_BOOLEAN,
  1476. nullptr,
  1477. 0,
  1478. nullptr,
  1479. 0);
  1480. rspamd_rcl_add_doc_by_path(cfg,
  1481. "logging",
  1482. "Write statistics of regexp processing to log (useful for hyperscan)",
  1483. "log_re_cache",
  1484. UCL_BOOLEAN,
  1485. nullptr,
  1486. 0,
  1487. nullptr,
  1488. 0);
  1489. rspamd_rcl_add_doc_by_path(cfg,
  1490. "logging",
  1491. "Use microseconds resolution for timestamps",
  1492. "log_usec",
  1493. UCL_BOOLEAN,
  1494. nullptr,
  1495. 0,
  1496. nullptr,
  1497. 0);
  1498. }
  1499. if (!(skip_sections && g_hash_table_lookup(skip_sections, "options"))) {
  1500. /**
  1501. * Options section
  1502. */
  1503. auto *sub = rspamd_rcl_add_section_doc(&top, nullptr,
  1504. "options", nullptr,
  1505. rspamd_rcl_options_handler,
  1506. UCL_OBJECT,
  1507. FALSE,
  1508. TRUE,
  1509. cfg->doc_strings,
  1510. "Global Rspamd options");
  1511. rspamd_rcl_add_default_handler(sub,
  1512. "cache_file",
  1513. rspamd_rcl_parse_struct_string,
  1514. G_STRUCT_OFFSET(struct rspamd_config, cache_filename),
  1515. RSPAMD_CL_FLAG_STRING_PATH,
  1516. "Path to the cache file");
  1517. rspamd_rcl_add_default_handler(sub,
  1518. "cache_reload",
  1519. rspamd_rcl_parse_struct_time,
  1520. G_STRUCT_OFFSET(struct rspamd_config, cache_reload_time),
  1521. RSPAMD_CL_FLAG_TIME_FLOAT,
  1522. "How often cache reload should be performed");
  1523. /* Old DNS configuration */
  1524. rspamd_rcl_add_default_handler(sub,
  1525. "dns_nameserver",
  1526. rspamd_rcl_parse_struct_ucl,
  1527. G_STRUCT_OFFSET(struct rspamd_config, nameservers),
  1528. 0,
  1529. "Legacy option for DNS servers used");
  1530. rspamd_rcl_add_default_handler(sub,
  1531. "dns_timeout",
  1532. rspamd_rcl_parse_struct_time,
  1533. G_STRUCT_OFFSET(struct rspamd_config, dns_timeout),
  1534. RSPAMD_CL_FLAG_TIME_FLOAT,
  1535. "Legacy option for DNS request timeout");
  1536. rspamd_rcl_add_default_handler(sub,
  1537. "dns_retransmits",
  1538. rspamd_rcl_parse_struct_integer,
  1539. G_STRUCT_OFFSET(struct rspamd_config, dns_retransmits),
  1540. RSPAMD_CL_FLAG_INT_32,
  1541. "Legacy option for DNS retransmits count");
  1542. rspamd_rcl_add_default_handler(sub,
  1543. "dns_sockets",
  1544. rspamd_rcl_parse_struct_integer,
  1545. G_STRUCT_OFFSET(struct rspamd_config, dns_io_per_server),
  1546. RSPAMD_CL_FLAG_INT_32,
  1547. "Legacy option for DNS sockets per server count");
  1548. rspamd_rcl_add_default_handler(sub,
  1549. "dns_max_requests",
  1550. rspamd_rcl_parse_struct_integer,
  1551. G_STRUCT_OFFSET(struct rspamd_config, dns_max_requests),
  1552. RSPAMD_CL_FLAG_INT_32,
  1553. "Maximum DNS requests per task (default: 64)");
  1554. rspamd_rcl_add_default_handler(sub,
  1555. "control_socket",
  1556. rspamd_rcl_parse_struct_string,
  1557. G_STRUCT_OFFSET(struct rspamd_config, control_socket_path),
  1558. 0,
  1559. "Path to the control socket");
  1560. rspamd_rcl_add_default_handler(sub,
  1561. "explicit_modules",
  1562. rspamd_rcl_parse_struct_string_list,
  1563. G_STRUCT_OFFSET(struct rspamd_config, explicit_modules),
  1564. RSPAMD_CL_FLAG_STRING_LIST_HASH,
  1565. "Always load these modules even if they are not configured explicitly");
  1566. rspamd_rcl_add_default_handler(sub,
  1567. "allow_raw_input",
  1568. rspamd_rcl_parse_struct_boolean,
  1569. G_STRUCT_OFFSET(struct rspamd_config, allow_raw_input),
  1570. 0,
  1571. "Allow non MIME input for rspamd");
  1572. rspamd_rcl_add_default_handler(sub,
  1573. "one_shot",
  1574. rspamd_rcl_parse_struct_boolean,
  1575. G_STRUCT_OFFSET(struct rspamd_config, one_shot_mode),
  1576. 0,
  1577. "Add all symbols only once per message");
  1578. rspamd_rcl_add_default_handler(sub,
  1579. "check_attachements",
  1580. rspamd_rcl_parse_struct_boolean,
  1581. G_STRUCT_OFFSET(struct rspamd_config, check_text_attachements),
  1582. 0,
  1583. "Treat text attachments as normal text parts");
  1584. rspamd_rcl_add_default_handler(sub,
  1585. "tempdir",
  1586. rspamd_rcl_parse_struct_string,
  1587. G_STRUCT_OFFSET(struct rspamd_config, temp_dir),
  1588. RSPAMD_CL_FLAG_STRING_PATH,
  1589. "Directory for temporary files");
  1590. rspamd_rcl_add_default_handler(sub,
  1591. "pidfile",
  1592. rspamd_rcl_parse_struct_string,
  1593. G_STRUCT_OFFSET(struct rspamd_config, pid_file),
  1594. RSPAMD_CL_FLAG_STRING_PATH,
  1595. "Path to the pid file");
  1596. rspamd_rcl_add_default_handler(sub,
  1597. "filters",
  1598. rspamd_rcl_parse_struct_string_list,
  1599. G_STRUCT_OFFSET(struct rspamd_config, filters),
  1600. 0,
  1601. "List of internal filters enabled");
  1602. rspamd_rcl_add_default_handler(sub,
  1603. "map_watch_interval",
  1604. rspamd_rcl_parse_struct_time,
  1605. G_STRUCT_OFFSET(struct rspamd_config, map_timeout),
  1606. RSPAMD_CL_FLAG_TIME_FLOAT,
  1607. "Interval for checking maps");
  1608. rspamd_rcl_add_default_handler(sub,
  1609. "map_file_watch_multiplier",
  1610. rspamd_rcl_parse_struct_double,
  1611. G_STRUCT_OFFSET(struct rspamd_config, map_file_watch_multiplier),
  1612. 0,
  1613. "Multiplier for map watch interval when map is file");
  1614. rspamd_rcl_add_default_handler(sub,
  1615. "maps_cache_dir",
  1616. rspamd_rcl_parse_struct_string,
  1617. G_STRUCT_OFFSET(struct rspamd_config, maps_cache_dir),
  1618. 0,
  1619. "Directory to save maps cached data (default: $DBDIR)");
  1620. rspamd_rcl_add_default_handler(sub,
  1621. "monitoring_watch_interval",
  1622. rspamd_rcl_parse_struct_time,
  1623. G_STRUCT_OFFSET(struct rspamd_config, monitored_interval),
  1624. RSPAMD_CL_FLAG_TIME_FLOAT,
  1625. "Interval for checking monitored instances");
  1626. rspamd_rcl_add_default_handler(sub,
  1627. "disable_monitoring",
  1628. rspamd_rcl_parse_struct_boolean,
  1629. G_STRUCT_OFFSET(struct rspamd_config, disable_monitored),
  1630. 0,
  1631. "Disable monitoring completely");
  1632. rspamd_rcl_add_default_handler(sub,
  1633. "fips_mode",
  1634. rspamd_rcl_parse_struct_boolean,
  1635. G_STRUCT_OFFSET(struct rspamd_config, fips_mode),
  1636. 0,
  1637. "Enable FIPS 140-2 mode in OpenSSL");
  1638. rspamd_rcl_add_default_handler(sub,
  1639. "dynamic_conf",
  1640. rspamd_rcl_parse_struct_string,
  1641. G_STRUCT_OFFSET(struct rspamd_config, dynamic_conf),
  1642. 0,
  1643. "Path to the dynamic configuration");
  1644. rspamd_rcl_add_default_handler(sub,
  1645. "rrd",
  1646. rspamd_rcl_parse_struct_string,
  1647. G_STRUCT_OFFSET(struct rspamd_config, rrd_file),
  1648. RSPAMD_CL_FLAG_STRING_PATH,
  1649. "Path to RRD file");
  1650. rspamd_rcl_add_default_handler(sub,
  1651. "stats_file",
  1652. rspamd_rcl_parse_struct_string,
  1653. G_STRUCT_OFFSET(struct rspamd_config, stats_file),
  1654. RSPAMD_CL_FLAG_STRING_PATH,
  1655. "Path to stats file");
  1656. rspamd_rcl_add_default_handler(sub,
  1657. "history_file",
  1658. rspamd_rcl_parse_struct_string,
  1659. G_STRUCT_OFFSET(struct rspamd_config, history_file),
  1660. RSPAMD_CL_FLAG_STRING_PATH,
  1661. "Path to history file");
  1662. rspamd_rcl_add_default_handler(sub,
  1663. "check_all_filters",
  1664. rspamd_rcl_parse_struct_boolean,
  1665. G_STRUCT_OFFSET(struct rspamd_config, check_all_filters),
  1666. 0,
  1667. "Always check all filters");
  1668. rspamd_rcl_add_default_handler(sub,
  1669. "public_groups_only",
  1670. rspamd_rcl_parse_struct_boolean,
  1671. G_STRUCT_OFFSET(struct rspamd_config, public_groups_only),
  1672. 0,
  1673. "Output merely public groups everywhere");
  1674. rspamd_rcl_add_default_handler(sub,
  1675. "enable_css_parser",
  1676. rspamd_rcl_parse_struct_boolean,
  1677. G_STRUCT_OFFSET(struct rspamd_config, enable_css_parser),
  1678. 0,
  1679. "Enable CSS parser (experimental)");
  1680. rspamd_rcl_add_default_handler(sub,
  1681. "enable_experimental",
  1682. rspamd_rcl_parse_struct_boolean,
  1683. G_STRUCT_OFFSET(struct rspamd_config, enable_experimental),
  1684. 0,
  1685. "Enable experimental plugins");
  1686. rspamd_rcl_add_default_handler(sub,
  1687. "disable_pcre_jit",
  1688. rspamd_rcl_parse_struct_boolean,
  1689. G_STRUCT_OFFSET(struct rspamd_config, disable_pcre_jit),
  1690. 0,
  1691. "Disable PCRE JIT");
  1692. rspamd_rcl_add_default_handler(sub,
  1693. "min_word_len",
  1694. rspamd_rcl_parse_struct_integer,
  1695. G_STRUCT_OFFSET(struct rspamd_config, min_word_len),
  1696. RSPAMD_CL_FLAG_UINT,
  1697. "Minimum length of the word to be considered in statistics/fuzzy");
  1698. rspamd_rcl_add_default_handler(sub,
  1699. "max_word_len",
  1700. rspamd_rcl_parse_struct_integer,
  1701. G_STRUCT_OFFSET(struct rspamd_config, max_word_len),
  1702. RSPAMD_CL_FLAG_UINT,
  1703. "Maximum length of the word to be considered in statistics/fuzzy");
  1704. rspamd_rcl_add_default_handler(sub,
  1705. "max_html_len",
  1706. rspamd_rcl_parse_struct_integer,
  1707. G_STRUCT_OFFSET(struct rspamd_config, max_word_len),
  1708. RSPAMD_CL_FLAG_INT_SIZE,
  1709. "Maximum length of the html part to be parsed");
  1710. rspamd_rcl_add_default_handler(sub,
  1711. "words_decay",
  1712. rspamd_rcl_parse_struct_integer,
  1713. G_STRUCT_OFFSET(struct rspamd_config, words_decay),
  1714. RSPAMD_CL_FLAG_UINT,
  1715. "Start skipping words at this amount");
  1716. rspamd_rcl_add_default_handler(sub,
  1717. "url_tld",
  1718. rspamd_rcl_parse_struct_string,
  1719. G_STRUCT_OFFSET(struct rspamd_config, tld_file),
  1720. RSPAMD_CL_FLAG_STRING_PATH,
  1721. "Path to the TLD file for urls detector");
  1722. rspamd_rcl_add_default_handler(sub,
  1723. "tld",
  1724. rspamd_rcl_parse_struct_string,
  1725. G_STRUCT_OFFSET(struct rspamd_config, tld_file),
  1726. RSPAMD_CL_FLAG_STRING_PATH,
  1727. "Path to the TLD file for urls detector");
  1728. rspamd_rcl_add_default_handler(sub,
  1729. "hs_cache_dir",
  1730. rspamd_rcl_parse_struct_string,
  1731. G_STRUCT_OFFSET(struct rspamd_config, hs_cache_dir),
  1732. RSPAMD_CL_FLAG_STRING_PATH,
  1733. "Path directory where rspamd would save hyperscan cache");
  1734. rspamd_rcl_add_default_handler(sub,
  1735. "history_rows",
  1736. rspamd_rcl_parse_struct_integer,
  1737. G_STRUCT_OFFSET(struct rspamd_config, history_rows),
  1738. RSPAMD_CL_FLAG_UINT,
  1739. "Number of records in the history file");
  1740. rspamd_rcl_add_default_handler(sub,
  1741. "disable_hyperscan",
  1742. rspamd_rcl_parse_struct_boolean,
  1743. G_STRUCT_OFFSET(struct rspamd_config, disable_hyperscan),
  1744. 0,
  1745. "Disable hyperscan optimizations for regular expressions");
  1746. rspamd_rcl_add_default_handler(sub,
  1747. "vectorized_hyperscan",
  1748. rspamd_rcl_parse_struct_boolean,
  1749. G_STRUCT_OFFSET(struct rspamd_config, vectorized_hyperscan),
  1750. 0,
  1751. "Use hyperscan in vectorized mode (obsoleted, do not use)");
  1752. rspamd_rcl_add_default_handler(sub,
  1753. "cores_dir",
  1754. rspamd_rcl_parse_struct_string,
  1755. G_STRUCT_OFFSET(struct rspamd_config, cores_dir),
  1756. RSPAMD_CL_FLAG_STRING_PATH,
  1757. "Path to the directory where rspamd core files are intended to be dumped");
  1758. rspamd_rcl_add_default_handler(sub,
  1759. "max_cores_size",
  1760. rspamd_rcl_parse_struct_integer,
  1761. G_STRUCT_OFFSET(struct rspamd_config, max_cores_size),
  1762. RSPAMD_CL_FLAG_INT_SIZE,
  1763. "Limit of joint size of all files in `cores_dir`");
  1764. rspamd_rcl_add_default_handler(sub,
  1765. "max_cores_count",
  1766. rspamd_rcl_parse_struct_integer,
  1767. G_STRUCT_OFFSET(struct rspamd_config, max_cores_count),
  1768. RSPAMD_CL_FLAG_INT_SIZE,
  1769. "Limit of files count in `cores_dir`");
  1770. rspamd_rcl_add_default_handler(sub,
  1771. "local_addrs",
  1772. rspamd_rcl_parse_struct_ucl,
  1773. G_STRUCT_OFFSET(struct rspamd_config, local_addrs),
  1774. 0,
  1775. "Use the specified addresses as local ones");
  1776. rspamd_rcl_add_default_handler(sub,
  1777. "local_networks",
  1778. rspamd_rcl_parse_struct_ucl,
  1779. G_STRUCT_OFFSET(struct rspamd_config, local_addrs),
  1780. 0,
  1781. "Use the specified addresses as local ones (alias for `local_addrs`)");
  1782. rspamd_rcl_add_default_handler(sub,
  1783. "trusted_keys",
  1784. rspamd_rcl_parse_struct_string_list,
  1785. G_STRUCT_OFFSET(struct rspamd_config, trusted_keys),
  1786. RSPAMD_CL_FLAG_STRING_LIST_HASH,
  1787. "List of trusted public keys used for signatures in base32 encoding");
  1788. rspamd_rcl_add_default_handler(sub,
  1789. "enable_shutdown_workaround",
  1790. rspamd_rcl_parse_struct_boolean,
  1791. G_STRUCT_OFFSET(struct rspamd_config, enable_shutdown_workaround),
  1792. 0,
  1793. "Enable workaround for legacy clients");
  1794. rspamd_rcl_add_default_handler(sub,
  1795. "ignore_received",
  1796. rspamd_rcl_parse_struct_boolean,
  1797. G_STRUCT_OFFSET(struct rspamd_config, ignore_received),
  1798. 0,
  1799. "Ignore data from the first received header");
  1800. rspamd_rcl_add_default_handler(sub,
  1801. "ssl_ca_path",
  1802. rspamd_rcl_parse_struct_string,
  1803. G_STRUCT_OFFSET(struct rspamd_config, ssl_ca_path),
  1804. RSPAMD_CL_FLAG_STRING_PATH,
  1805. "Path to ssl CA file");
  1806. rspamd_rcl_add_default_handler(sub,
  1807. "ssl_ciphers",
  1808. rspamd_rcl_parse_struct_string,
  1809. G_STRUCT_OFFSET(struct rspamd_config, ssl_ciphers),
  1810. 0,
  1811. "List of ssl ciphers (e.g. HIGH:!aNULL:!kRSA:!PSK:!SRP:!MD5:!RC4)");
  1812. rspamd_rcl_add_default_handler(sub,
  1813. "max_message",
  1814. rspamd_rcl_parse_struct_integer,
  1815. G_STRUCT_OFFSET(struct rspamd_config, max_message),
  1816. RSPAMD_CL_FLAG_INT_SIZE,
  1817. "Maximum size of the message to be scanned (50Mb by default)");
  1818. rspamd_rcl_add_default_handler(sub,
  1819. "max_pic",
  1820. rspamd_rcl_parse_struct_integer,
  1821. G_STRUCT_OFFSET(struct rspamd_config, max_pic_size),
  1822. RSPAMD_CL_FLAG_INT_SIZE,
  1823. "Maximum size of the picture to be normalized (1Mb by default)");
  1824. rspamd_rcl_add_default_handler(sub,
  1825. "images_cache",
  1826. rspamd_rcl_parse_struct_integer,
  1827. G_STRUCT_OFFSET(struct rspamd_config, max_pic_size),
  1828. RSPAMD_CL_FLAG_INT_SIZE,
  1829. "Size of DCT data cache for images (256 elements by default)");
  1830. rspamd_rcl_add_default_handler(sub,
  1831. "zstd_input_dictionary",
  1832. rspamd_rcl_parse_struct_string,
  1833. G_STRUCT_OFFSET(struct rspamd_config, zstd_input_dictionary),
  1834. RSPAMD_CL_FLAG_STRING_PATH,
  1835. "Dictionary for zstd inbound protocol compression");
  1836. rspamd_rcl_add_default_handler(sub,
  1837. "zstd_output_dictionary",
  1838. rspamd_rcl_parse_struct_string,
  1839. G_STRUCT_OFFSET(struct rspamd_config, zstd_output_dictionary),
  1840. RSPAMD_CL_FLAG_STRING_PATH,
  1841. "Dictionary for outbound zstd compression");
  1842. rspamd_rcl_add_default_handler(sub,
  1843. "compat_messages",
  1844. rspamd_rcl_parse_struct_boolean,
  1845. G_STRUCT_OFFSET(struct rspamd_config, compat_messages),
  1846. 0,
  1847. "Use pre 1.4 style of messages in the protocol");
  1848. rspamd_rcl_add_default_handler(sub,
  1849. "max_shots",
  1850. rspamd_rcl_parse_struct_integer,
  1851. G_STRUCT_OFFSET(struct rspamd_config, default_max_shots),
  1852. 0,
  1853. "Maximum number of hits per a single symbol (default: 100)");
  1854. rspamd_rcl_add_default_handler(sub,
  1855. "sessions_cache",
  1856. rspamd_rcl_parse_struct_boolean,
  1857. G_STRUCT_OFFSET(struct rspamd_config, enable_sessions_cache),
  1858. 0,
  1859. "Enable sessions cache to debug dangling sessions");
  1860. rspamd_rcl_add_default_handler(sub,
  1861. "max_sessions_cache",
  1862. rspamd_rcl_parse_struct_integer,
  1863. G_STRUCT_OFFSET(struct rspamd_config, max_sessions_cache),
  1864. 0,
  1865. "Maximum number of sessions in cache before warning (default: 100)");
  1866. rspamd_rcl_add_default_handler(sub,
  1867. "task_timeout",
  1868. rspamd_rcl_parse_struct_time,
  1869. G_STRUCT_OFFSET(struct rspamd_config, task_timeout),
  1870. RSPAMD_CL_FLAG_TIME_FLOAT,
  1871. "Maximum time for checking a message");
  1872. rspamd_rcl_add_default_handler(sub,
  1873. "soft_reject_on_timeout",
  1874. rspamd_rcl_parse_struct_boolean,
  1875. G_STRUCT_OFFSET(struct rspamd_config, soft_reject_on_timeout),
  1876. 0,
  1877. "Emit soft reject if task timeout takes place");
  1878. rspamd_rcl_add_default_handler(sub,
  1879. "check_timeout",
  1880. rspamd_rcl_parse_struct_time,
  1881. G_STRUCT_OFFSET(struct rspamd_config, task_timeout),
  1882. RSPAMD_CL_FLAG_TIME_FLOAT,
  1883. "Maximum time for checking a message (alias for task_timeout)");
  1884. rspamd_rcl_add_default_handler(sub,
  1885. "lua_gc_step",
  1886. rspamd_rcl_parse_struct_integer,
  1887. G_STRUCT_OFFSET(struct rspamd_config, lua_gc_step),
  1888. RSPAMD_CL_FLAG_UINT,
  1889. "Lua garbage-collector step (default: 200)");
  1890. rspamd_rcl_add_default_handler(sub,
  1891. "lua_gc_pause",
  1892. rspamd_rcl_parse_struct_integer,
  1893. G_STRUCT_OFFSET(struct rspamd_config, lua_gc_pause),
  1894. RSPAMD_CL_FLAG_UINT,
  1895. "Lua garbage-collector pause (default: 200)");
  1896. rspamd_rcl_add_default_handler(sub,
  1897. "full_gc_iters",
  1898. rspamd_rcl_parse_struct_integer,
  1899. G_STRUCT_OFFSET(struct rspamd_config, full_gc_iters),
  1900. RSPAMD_CL_FLAG_UINT,
  1901. "Task scanned before memory gc is performed (default: 0 - disabled)");
  1902. rspamd_rcl_add_default_handler(sub,
  1903. "heartbeat_interval",
  1904. rspamd_rcl_parse_struct_time,
  1905. G_STRUCT_OFFSET(struct rspamd_config, heartbeat_interval),
  1906. RSPAMD_CL_FLAG_TIME_FLOAT,
  1907. "Time between workers heartbeats");
  1908. rspamd_rcl_add_default_handler(sub,
  1909. "heartbeats_loss_max",
  1910. rspamd_rcl_parse_struct_integer,
  1911. G_STRUCT_OFFSET(struct rspamd_config, heartbeats_loss_max),
  1912. RSPAMD_CL_FLAG_INT_32,
  1913. "Maximum count of heartbeats to be lost before trying to "
  1914. "terminate a worker (default: 0 - disabled)");
  1915. rspamd_rcl_add_default_handler(sub,
  1916. "max_lua_urls",
  1917. rspamd_rcl_parse_struct_integer,
  1918. G_STRUCT_OFFSET(struct rspamd_config, max_lua_urls),
  1919. RSPAMD_CL_FLAG_INT_32,
  1920. "Maximum count of URLs to pass to Lua to avoid DoS (default: 1024)");
  1921. rspamd_rcl_add_default_handler(sub,
  1922. "max_urls",
  1923. rspamd_rcl_parse_struct_integer,
  1924. G_STRUCT_OFFSET(struct rspamd_config, max_urls),
  1925. RSPAMD_CL_FLAG_INT_32,
  1926. "Maximum count of URLs to process to avoid DoS (default: 10240)");
  1927. rspamd_rcl_add_default_handler(sub,
  1928. "max_recipients",
  1929. rspamd_rcl_parse_struct_integer,
  1930. G_STRUCT_OFFSET(struct rspamd_config, max_recipients),
  1931. RSPAMD_CL_FLAG_INT_32,
  1932. "Maximum count of recipients to process to avoid DoS (default: 1024)");
  1933. rspamd_rcl_add_default_handler(sub,
  1934. "max_blas_threads",
  1935. rspamd_rcl_parse_struct_integer,
  1936. G_STRUCT_OFFSET(struct rspamd_config, max_blas_threads),
  1937. RSPAMD_CL_FLAG_INT_32,
  1938. "Maximum number of Blas threads for learning neural networks (default: 1)");
  1939. rspamd_rcl_add_default_handler(sub,
  1940. "max_opts_len",
  1941. rspamd_rcl_parse_struct_integer,
  1942. G_STRUCT_OFFSET(struct rspamd_config, max_opts_len),
  1943. RSPAMD_CL_FLAG_INT_32,
  1944. "Maximum size of all options for a single symbol (default: 4096)");
  1945. rspamd_rcl_add_default_handler(sub,
  1946. "events_backend",
  1947. rspamd_rcl_parse_struct_string,
  1948. G_STRUCT_OFFSET(struct rspamd_config, events_backend),
  1949. 0,
  1950. "Events backend to use: kqueue, epoll, select, poll or auto (default: auto)");
  1951. rspamd_rcl_add_doc_by_path(cfg,
  1952. "options",
  1953. "Swtich mode of gtube patterns: disable, reject, all",
  1954. "gtube_patterns",
  1955. UCL_STRING,
  1956. nullptr,
  1957. 0,
  1958. "reject",
  1959. 0);
  1960. /* Neighbours configuration */
  1961. rspamd_rcl_add_section_doc(&top, sub, "neighbours", "name",
  1962. rspamd_rcl_neighbours_handler,
  1963. UCL_OBJECT, FALSE, TRUE,
  1964. cfg->doc_strings,
  1965. "List of members of Rspamd cluster");
  1966. /* New DNS configuration */
  1967. auto *ssub = rspamd_rcl_add_section_doc(&top, sub, "dns", nullptr, nullptr,
  1968. UCL_OBJECT, FALSE, TRUE,
  1969. nullptr,
  1970. "Options for DNS resolver");
  1971. rspamd_rcl_add_default_handler(ssub,
  1972. "nameserver",
  1973. rspamd_rcl_parse_struct_ucl,
  1974. G_STRUCT_OFFSET(struct rspamd_config, nameservers),
  1975. 0,
  1976. "List of DNS servers");
  1977. rspamd_rcl_add_default_handler(ssub,
  1978. "server",
  1979. rspamd_rcl_parse_struct_ucl,
  1980. G_STRUCT_OFFSET(struct rspamd_config, nameservers),
  1981. 0,
  1982. "List of DNS servers");
  1983. rspamd_rcl_add_default_handler(ssub,
  1984. "timeout",
  1985. rspamd_rcl_parse_struct_time,
  1986. G_STRUCT_OFFSET(struct rspamd_config, dns_timeout),
  1987. RSPAMD_CL_FLAG_TIME_FLOAT,
  1988. "DNS request timeout");
  1989. rspamd_rcl_add_default_handler(ssub,
  1990. "retransmits",
  1991. rspamd_rcl_parse_struct_integer,
  1992. G_STRUCT_OFFSET(struct rspamd_config, dns_retransmits),
  1993. RSPAMD_CL_FLAG_INT_32,
  1994. "DNS request retransmits");
  1995. rspamd_rcl_add_default_handler(ssub,
  1996. "sockets",
  1997. rspamd_rcl_parse_struct_integer,
  1998. G_STRUCT_OFFSET(struct rspamd_config, dns_io_per_server),
  1999. RSPAMD_CL_FLAG_INT_32,
  2000. "Number of sockets per DNS server");
  2001. rspamd_rcl_add_default_handler(ssub,
  2002. "connections",
  2003. rspamd_rcl_parse_struct_integer,
  2004. G_STRUCT_OFFSET(struct rspamd_config, dns_io_per_server),
  2005. RSPAMD_CL_FLAG_INT_32,
  2006. "Number of sockets per DNS server");
  2007. rspamd_rcl_add_default_handler(ssub,
  2008. "enable_dnssec",
  2009. rspamd_rcl_parse_struct_boolean,
  2010. G_STRUCT_OFFSET(struct rspamd_config, enable_dnssec),
  2011. 0,
  2012. "Enable DNSSEC support in Rspamd");
  2013. /* New upstreams configuration */
  2014. ssub = rspamd_rcl_add_section_doc(&top, sub, "upstream", nullptr, nullptr,
  2015. UCL_OBJECT, FALSE, TRUE,
  2016. nullptr,
  2017. "Upstreams configuration parameters");
  2018. rspamd_rcl_add_default_handler(ssub,
  2019. "max_errors",
  2020. rspamd_rcl_parse_struct_integer,
  2021. G_STRUCT_OFFSET(struct rspamd_config, upstream_max_errors),
  2022. RSPAMD_CL_FLAG_UINT,
  2023. "Maximum number of errors during `error_time` to consider upstream down");
  2024. rspamd_rcl_add_default_handler(ssub,
  2025. "error_time",
  2026. rspamd_rcl_parse_struct_time,
  2027. G_STRUCT_OFFSET(struct rspamd_config, upstream_error_time),
  2028. RSPAMD_CL_FLAG_TIME_FLOAT,
  2029. "Time frame to check errors");
  2030. rspamd_rcl_add_default_handler(ssub,
  2031. "revive_time",
  2032. rspamd_rcl_parse_struct_time,
  2033. G_STRUCT_OFFSET(struct rspamd_config, upstream_revive_time),
  2034. RSPAMD_CL_FLAG_TIME_FLOAT,
  2035. "Time before attempting to recover upstream after an error");
  2036. rspamd_rcl_add_default_handler(ssub,
  2037. "lazy_resolve_time",
  2038. rspamd_rcl_parse_struct_time,
  2039. G_STRUCT_OFFSET(struct rspamd_config, upstream_lazy_resolve_time),
  2040. RSPAMD_CL_FLAG_TIME_FLOAT,
  2041. "Time to resolve upstreams addresses in lazy mode");
  2042. rspamd_rcl_add_default_handler(ssub,
  2043. "resolve_min_interval",
  2044. rspamd_rcl_parse_struct_time,
  2045. G_STRUCT_OFFSET(struct rspamd_config, upstream_resolve_min_interval),
  2046. RSPAMD_CL_FLAG_TIME_FLOAT,
  2047. "Minumum interval to perform resolving (60 seconds by default)");
  2048. }
  2049. if (!(skip_sections && g_hash_table_lookup(skip_sections, "actions"))) {
  2050. /**
  2051. * Symbols and actions sections
  2052. */
  2053. auto *sub = rspamd_rcl_add_section_doc(&top, nullptr,
  2054. "actions", nullptr,
  2055. rspamd_rcl_actions_handler,
  2056. UCL_OBJECT,
  2057. FALSE,
  2058. TRUE,
  2059. cfg->doc_strings,
  2060. "Actions configuration");
  2061. rspamd_rcl_add_default_handler(sub,
  2062. "unknown_weight",
  2063. rspamd_rcl_parse_struct_double,
  2064. G_STRUCT_OFFSET(struct rspamd_config, unknown_weight),
  2065. 0,
  2066. "Accept unknown symbols with the specified weight");
  2067. rspamd_rcl_add_default_handler(sub,
  2068. "grow_factor",
  2069. rspamd_rcl_parse_struct_double,
  2070. G_STRUCT_OFFSET(struct rspamd_config, grow_factor),
  2071. 0,
  2072. "Multiply the subsequent symbols by this number "
  2073. "(does not affect symbols with score less or "
  2074. "equal to zero)");
  2075. rspamd_rcl_add_default_handler(sub,
  2076. "subject",
  2077. rspamd_rcl_parse_struct_string,
  2078. G_STRUCT_OFFSET(struct rspamd_config, subject),
  2079. 0,
  2080. "Rewrite subject with this value");
  2081. }
  2082. if (!(skip_sections && g_hash_table_lookup(skip_sections, "group"))) {
  2083. auto *sub = rspamd_rcl_add_section_doc(&top, nullptr,
  2084. "group", "name",
  2085. rspamd_rcl_group_handler,
  2086. UCL_OBJECT,
  2087. FALSE,
  2088. TRUE,
  2089. cfg->doc_strings,
  2090. "Symbol groups configuration");
  2091. rspamd_rcl_add_section_doc(&top, sub, "symbols", "name",
  2092. rspamd_rcl_symbol_handler,
  2093. UCL_OBJECT, FALSE, TRUE,
  2094. cfg->doc_strings,
  2095. "Symbols configuration");
  2096. /* Group part */
  2097. rspamd_rcl_add_default_handler(sub,
  2098. "max_score",
  2099. rspamd_rcl_parse_struct_double,
  2100. G_STRUCT_OFFSET(struct rspamd_symbols_group, max_score),
  2101. 0,
  2102. "Maximum score that could be reached by this symbols group");
  2103. }
  2104. if (!(skip_sections && g_hash_table_lookup(skip_sections, "worker"))) {
  2105. /**
  2106. * Worker section
  2107. */
  2108. auto *sub = rspamd_rcl_add_section_doc(&top, nullptr, "worker", "type",
  2109. rspamd_rcl_worker_handler,
  2110. UCL_OBJECT,
  2111. FALSE,
  2112. TRUE,
  2113. cfg->doc_strings,
  2114. "Workers common options");
  2115. rspamd_rcl_add_default_handler(sub,
  2116. "count",
  2117. rspamd_rcl_parse_struct_integer,
  2118. G_STRUCT_OFFSET(struct rspamd_worker_conf, count),
  2119. RSPAMD_CL_FLAG_INT_16,
  2120. "Number of workers to spawn");
  2121. rspamd_rcl_add_default_handler(sub,
  2122. "max_files",
  2123. rspamd_rcl_parse_struct_integer,
  2124. G_STRUCT_OFFSET(struct rspamd_worker_conf, rlimit_nofile),
  2125. RSPAMD_CL_FLAG_INT_64,
  2126. "Maximum number of opened files per worker");
  2127. rspamd_rcl_add_default_handler(sub,
  2128. "max_core",
  2129. rspamd_rcl_parse_struct_integer,
  2130. G_STRUCT_OFFSET(struct rspamd_worker_conf, rlimit_maxcore),
  2131. RSPAMD_CL_FLAG_INT_64,
  2132. "Max size of core file in bytes");
  2133. rspamd_rcl_add_default_handler(sub,
  2134. "enabled",
  2135. rspamd_rcl_parse_struct_boolean,
  2136. G_STRUCT_OFFSET(struct rspamd_worker_conf, enabled),
  2137. 0,
  2138. "Enable or disable a worker (true by default)");
  2139. }
  2140. if (!(skip_sections && g_hash_table_lookup(skip_sections, "modules"))) {
  2141. /**
  2142. * Modules handler
  2143. */
  2144. rspamd_rcl_add_section_doc(&top, nullptr,
  2145. "modules", nullptr,
  2146. rspamd_rcl_modules_handler,
  2147. UCL_OBJECT,
  2148. FALSE,
  2149. FALSE,
  2150. cfg->doc_strings,
  2151. "Lua plugins to load");
  2152. }
  2153. if (!(skip_sections && g_hash_table_lookup(skip_sections, "classifier"))) {
  2154. /**
  2155. * Classifiers handler
  2156. */
  2157. auto *sub = rspamd_rcl_add_section_doc(&top, nullptr,
  2158. "classifier", "type",
  2159. rspamd_rcl_classifier_handler,
  2160. UCL_OBJECT,
  2161. FALSE,
  2162. TRUE,
  2163. cfg->doc_strings,
  2164. "CLassifier options");
  2165. /* Default classifier is 'bayes' for now */
  2166. sub->default_key = "bayes";
  2167. rspamd_rcl_add_default_handler(sub,
  2168. "min_tokens",
  2169. rspamd_rcl_parse_struct_integer,
  2170. G_STRUCT_OFFSET(struct rspamd_classifier_config, min_tokens),
  2171. RSPAMD_CL_FLAG_INT_32,
  2172. "Minimum count of tokens (words) to be considered for statistics");
  2173. rspamd_rcl_add_default_handler(sub,
  2174. "min_token_hits",
  2175. rspamd_rcl_parse_struct_integer,
  2176. G_STRUCT_OFFSET(struct rspamd_classifier_config, min_token_hits),
  2177. RSPAMD_CL_FLAG_UINT,
  2178. "Minimum number of hits for a token to be considered");
  2179. rspamd_rcl_add_default_handler(sub,
  2180. "min_prob_strength",
  2181. rspamd_rcl_parse_struct_double,
  2182. G_STRUCT_OFFSET(struct rspamd_classifier_config, min_token_hits),
  2183. 0,
  2184. "Use only tokens with probability in [0.5 - MPS, 0.5 + MPS]");
  2185. rspamd_rcl_add_default_handler(sub,
  2186. "max_tokens",
  2187. rspamd_rcl_parse_struct_integer,
  2188. G_STRUCT_OFFSET(struct rspamd_classifier_config, max_tokens),
  2189. RSPAMD_CL_FLAG_INT_32,
  2190. "Maximum count of tokens (words) to be considered for statistics");
  2191. rspamd_rcl_add_default_handler(sub,
  2192. "min_learns",
  2193. rspamd_rcl_parse_struct_integer,
  2194. G_STRUCT_OFFSET(struct rspamd_classifier_config, min_learns),
  2195. RSPAMD_CL_FLAG_UINT,
  2196. "Minimum number of learns for each statfile to use this classifier");
  2197. rspamd_rcl_add_default_handler(sub,
  2198. "backend",
  2199. rspamd_rcl_parse_struct_string,
  2200. G_STRUCT_OFFSET(struct rspamd_classifier_config, backend),
  2201. 0,
  2202. "Statfiles engine");
  2203. rspamd_rcl_add_default_handler(sub,
  2204. "name",
  2205. rspamd_rcl_parse_struct_string,
  2206. G_STRUCT_OFFSET(struct rspamd_classifier_config, name),
  2207. 0,
  2208. "Name of classifier");
  2209. /*
  2210. * Statfile defaults
  2211. */
  2212. auto *ssub = rspamd_rcl_add_section_doc(&top, sub,
  2213. "statfile", "symbol",
  2214. rspamd_rcl_statfile_handler,
  2215. UCL_OBJECT,
  2216. TRUE,
  2217. TRUE,
  2218. sub->doc_ref,
  2219. "Statfiles options");
  2220. rspamd_rcl_add_default_handler(ssub,
  2221. "label",
  2222. rspamd_rcl_parse_struct_string,
  2223. G_STRUCT_OFFSET(struct rspamd_statfile_config, label),
  2224. 0,
  2225. "Statfile unique label");
  2226. rspamd_rcl_add_default_handler(ssub,
  2227. "spam",
  2228. rspamd_rcl_parse_struct_boolean,
  2229. G_STRUCT_OFFSET(struct rspamd_statfile_config, is_spam),
  2230. 0,
  2231. "Sets if this statfile contains spam samples");
  2232. }
  2233. if (!(skip_sections && g_hash_table_lookup(skip_sections, "composite"))) {
  2234. /**
  2235. * Composites handlers
  2236. */
  2237. rspamd_rcl_add_section_doc(&top, nullptr,
  2238. "composite", "name",
  2239. rspamd_rcl_composite_handler,
  2240. UCL_OBJECT,
  2241. FALSE,
  2242. TRUE,
  2243. cfg->doc_strings,
  2244. "Rspamd composite symbols");
  2245. rspamd_rcl_add_section_doc(&top, nullptr,
  2246. "composites", nullptr,
  2247. rspamd_rcl_composites_handler,
  2248. UCL_OBJECT,
  2249. FALSE,
  2250. TRUE,
  2251. cfg->doc_strings,
  2252. "Rspamd composite symbols");
  2253. }
  2254. if (!(skip_sections && g_hash_table_lookup(skip_sections, "lua"))) {
  2255. /**
  2256. * Lua handler
  2257. */
  2258. rspamd_rcl_add_section_doc(&top, nullptr,
  2259. "lua", nullptr,
  2260. rspamd_rcl_lua_handler,
  2261. UCL_STRING,
  2262. FALSE,
  2263. TRUE,
  2264. cfg->doc_strings,
  2265. "Lua files to load");
  2266. }
  2267. cfg->rcl_top_section = top;
  2268. return top;
  2269. }
  2270. static bool
  2271. rspamd_rcl_process_section(struct rspamd_config *cfg,
  2272. const struct rspamd_rcl_section &sec,
  2273. gpointer ptr, const ucl_object_t *obj, rspamd_mempool_t *pool,
  2274. GError **err)
  2275. {
  2276. ucl_object_iter_t it;
  2277. const ucl_object_t *cur;
  2278. auto is_nested = true;
  2279. const char *key = nullptr;
  2280. if (sec.processed) {
  2281. /* Section has been already processed */
  2282. return TRUE;
  2283. }
  2284. g_assert(obj != nullptr);
  2285. g_assert(sec.handler != nullptr);
  2286. if (sec.key_attr) {
  2287. it = ucl_object_iterate_new(obj);
  2288. while ((cur = ucl_object_iterate_full(it, UCL_ITERATE_EXPLICIT)) != nullptr) {
  2289. if (ucl_object_type(cur) != UCL_OBJECT) {
  2290. is_nested = false;
  2291. break;
  2292. }
  2293. }
  2294. ucl_object_iterate_free(it);
  2295. }
  2296. else {
  2297. is_nested = false;
  2298. }
  2299. if (is_nested) {
  2300. /* Just reiterate on all subobjects */
  2301. it = ucl_object_iterate_new(obj);
  2302. while ((cur = ucl_object_iterate_full(it, UCL_ITERATE_EXPLICIT)) != nullptr) {
  2303. if (!sec.handler(pool, cur, ucl_object_key(cur), ptr, const_cast<rspamd_rcl_section *>(&sec), err)) {
  2304. ucl_object_iterate_free(it);
  2305. return false;
  2306. }
  2307. }
  2308. ucl_object_iterate_free(it);
  2309. return true;
  2310. }
  2311. else {
  2312. if (sec.key_attr) {
  2313. /* First of all search for required attribute and use it as a key */
  2314. cur = ucl_object_lookup(obj, sec.key_attr.value().c_str());
  2315. if (cur == nullptr) {
  2316. if (!sec.default_key) {
  2317. g_set_error(err, CFG_RCL_ERROR, EINVAL, "required attribute "
  2318. "'%s' is missing for section '%s', current key: %s",
  2319. sec.key_attr.value().c_str(),
  2320. sec.name.c_str(),
  2321. ucl_object_key(obj));
  2322. return false;
  2323. }
  2324. else {
  2325. msg_info("using default key '%s' for mandatory field '%s' "
  2326. "for section '%s'",
  2327. sec.default_key.value().c_str(), sec.key_attr.value().c_str(),
  2328. sec.name.c_str());
  2329. key = sec.default_key.value().c_str();
  2330. }
  2331. }
  2332. else if (ucl_object_type(cur) != UCL_STRING) {
  2333. g_set_error(err, CFG_RCL_ERROR, EINVAL, "required attribute %s"
  2334. " is not a string for section %s",
  2335. sec.key_attr.value().c_str(), sec.name.c_str());
  2336. return false;
  2337. }
  2338. else {
  2339. key = ucl_object_tostring(cur);
  2340. }
  2341. }
  2342. }
  2343. return sec.handler(pool, obj, key, ptr, const_cast<rspamd_rcl_section *>(&sec), err);
  2344. }
  2345. gboolean
  2346. rspamd_rcl_parse(struct rspamd_rcl_sections_map *top,
  2347. struct rspamd_config *cfg,
  2348. gpointer ptr, rspamd_mempool_t *pool,
  2349. const ucl_object_t *obj, GError **err)
  2350. {
  2351. if (obj->type != UCL_OBJECT) {
  2352. g_set_error(err,
  2353. CFG_RCL_ERROR,
  2354. EINVAL,
  2355. "top configuration must be an object");
  2356. return FALSE;
  2357. }
  2358. /* Iterate over known sections and ignore unknown ones */
  2359. for (const auto &sec_ptr: top->sections_order) {
  2360. if (sec_ptr->name == "*") {
  2361. /* Default section handler */
  2362. const auto *cur_obj = obj;
  2363. LL_FOREACH(obj, cur_obj)
  2364. {
  2365. if (!top->sections.contains(ucl_object_key(cur_obj))) {
  2366. if (sec_ptr->handler != nullptr) {
  2367. if (!rspamd_rcl_process_section(cfg, *sec_ptr, ptr, cur_obj,
  2368. pool, err)) {
  2369. return FALSE;
  2370. }
  2371. }
  2372. else {
  2373. rspamd_rcl_section_parse_defaults(cfg,
  2374. *sec_ptr,
  2375. pool,
  2376. cur_obj,
  2377. ptr,
  2378. err);
  2379. }
  2380. }
  2381. }
  2382. }
  2383. else {
  2384. const auto *found = ucl_object_lookup(obj, sec_ptr->name.c_str());
  2385. if (found == nullptr) {
  2386. if (sec_ptr->required) {
  2387. g_set_error(err, CFG_RCL_ERROR, ENOENT,
  2388. "required section %s is missing", sec_ptr->name.c_str());
  2389. return FALSE;
  2390. }
  2391. }
  2392. else {
  2393. /* Check type */
  2394. if (sec_ptr->strict_type) {
  2395. if (sec_ptr->type != found->type) {
  2396. g_set_error(err, CFG_RCL_ERROR, EINVAL,
  2397. "object in section %s has invalid type", sec_ptr->name.c_str());
  2398. return FALSE;
  2399. }
  2400. }
  2401. const auto *cur_obj = found;
  2402. LL_FOREACH(found, cur_obj)
  2403. {
  2404. if (sec_ptr->handler != nullptr) {
  2405. if (!rspamd_rcl_process_section(cfg, *sec_ptr, ptr, cur_obj,
  2406. pool, err)) {
  2407. return FALSE;
  2408. }
  2409. }
  2410. else {
  2411. rspamd_rcl_section_parse_defaults(cfg, *sec_ptr,
  2412. pool,
  2413. cur_obj,
  2414. ptr,
  2415. err);
  2416. }
  2417. }
  2418. }
  2419. }
  2420. if (sec_ptr->fin) {
  2421. sec_ptr->fin(pool, sec_ptr->fin_ud);
  2422. }
  2423. }
  2424. return TRUE;
  2425. }
  2426. static bool
  2427. rspamd_rcl_section_parse_defaults(struct rspamd_config *cfg,
  2428. const struct rspamd_rcl_section &section,
  2429. rspamd_mempool_t *pool, const ucl_object_t *obj, gpointer ptr,
  2430. GError **err)
  2431. {
  2432. if (obj->type != UCL_OBJECT) {
  2433. g_set_error(err,
  2434. CFG_RCL_ERROR,
  2435. EINVAL,
  2436. "default configuration must be an object for section %s "
  2437. "(actual type is %s)",
  2438. section.name.c_str(), ucl_object_type_to_string(ucl_object_type(obj)));
  2439. return FALSE;
  2440. }
  2441. for (const auto &cur: section.default_parser) {
  2442. const auto *found = ucl_object_lookup(obj, cur.first.c_str());
  2443. if (found != nullptr) {
  2444. auto new_pd = cur.second.pd;
  2445. new_pd.user_struct = ptr;
  2446. new_pd.cfg = cfg;
  2447. const auto *cur_obj = found;
  2448. LL_FOREACH(found, cur_obj)
  2449. {
  2450. if (!cur.second.handler(pool, cur_obj, &new_pd, const_cast<rspamd_rcl_section *>(&section), err)) {
  2451. return FALSE;
  2452. }
  2453. if (!(new_pd.flags & RSPAMD_CL_FLAG_MULTIPLE)) {
  2454. break;
  2455. }
  2456. }
  2457. }
  2458. }
  2459. return TRUE;
  2460. }
  2461. gboolean
  2462. rspamd_rcl_parse_struct_string(rspamd_mempool_t *pool,
  2463. const ucl_object_t *obj,
  2464. gpointer ud,
  2465. struct rspamd_rcl_section *section,
  2466. GError **err)
  2467. {
  2468. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2469. const gsize num_str_len = 32;
  2470. auto target = (char **) (((char *) pd->user_struct) + pd->offset);
  2471. switch (obj->type) {
  2472. case UCL_STRING:
  2473. *target =
  2474. rspamd_mempool_strdup(pool, ucl_copy_value_trash(obj));
  2475. break;
  2476. case UCL_INT:
  2477. *target = (char *) rspamd_mempool_alloc(pool, num_str_len);
  2478. rspamd_snprintf(*target, num_str_len, "%L", obj->value.iv);
  2479. break;
  2480. case UCL_FLOAT:
  2481. *target = (char *) rspamd_mempool_alloc(pool, num_str_len);
  2482. rspamd_snprintf(*target, num_str_len, "%f", obj->value.dv);
  2483. break;
  2484. case UCL_BOOLEAN:
  2485. *target = (char *) rspamd_mempool_alloc(pool, num_str_len);
  2486. rspamd_snprintf(*target, num_str_len, "%s",
  2487. ((gboolean) obj->value.iv) ? "true" : "false");
  2488. break;
  2489. case UCL_NULL:
  2490. /* String is enforced to be null */
  2491. *target = nullptr;
  2492. break;
  2493. default:
  2494. g_set_error(err,
  2495. CFG_RCL_ERROR,
  2496. EINVAL,
  2497. "cannot convert %s to string in option %s",
  2498. ucl_object_type_to_string(ucl_object_type(obj)),
  2499. ucl_object_key(obj));
  2500. return FALSE;
  2501. }
  2502. return TRUE;
  2503. }
  2504. gboolean
  2505. rspamd_rcl_parse_struct_integer(rspamd_mempool_t *pool,
  2506. const ucl_object_t *obj,
  2507. gpointer ud,
  2508. struct rspamd_rcl_section *section,
  2509. GError **err)
  2510. {
  2511. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2512. union {
  2513. int *ip;
  2514. int32_t *i32p;
  2515. int16_t *i16p;
  2516. int64_t *i64p;
  2517. unsigned int *up;
  2518. gsize *sp;
  2519. } target;
  2520. int64_t val;
  2521. if (pd->flags == RSPAMD_CL_FLAG_INT_32) {
  2522. target.i32p = (int32_t *) (((char *) pd->user_struct) + pd->offset);
  2523. if (!ucl_object_toint_safe(obj, &val)) {
  2524. g_set_error(err,
  2525. CFG_RCL_ERROR,
  2526. EINVAL,
  2527. "cannot convert %s to integer in option %s",
  2528. ucl_object_type_to_string(ucl_object_type(obj)),
  2529. ucl_object_key(obj));
  2530. return FALSE;
  2531. }
  2532. *target.i32p = val;
  2533. }
  2534. else if (pd->flags == RSPAMD_CL_FLAG_INT_64) {
  2535. target.i64p = (int64_t *) (((char *) pd->user_struct) + pd->offset);
  2536. if (!ucl_object_toint_safe(obj, &val)) {
  2537. g_set_error(err,
  2538. CFG_RCL_ERROR,
  2539. EINVAL,
  2540. "cannot convert %s to integer in option %s",
  2541. ucl_object_type_to_string(ucl_object_type(obj)),
  2542. ucl_object_key(obj));
  2543. return FALSE;
  2544. }
  2545. *target.i64p = val;
  2546. }
  2547. else if (pd->flags == RSPAMD_CL_FLAG_INT_SIZE) {
  2548. target.sp = (gsize *) (((char *) pd->user_struct) + pd->offset);
  2549. if (!ucl_object_toint_safe(obj, &val)) {
  2550. g_set_error(err,
  2551. CFG_RCL_ERROR,
  2552. EINVAL,
  2553. "cannot convert %s to integer in option %s",
  2554. ucl_object_type_to_string(ucl_object_type(obj)),
  2555. ucl_object_key(obj));
  2556. return FALSE;
  2557. }
  2558. *target.sp = val;
  2559. }
  2560. else if (pd->flags == RSPAMD_CL_FLAG_INT_16) {
  2561. target.i16p = (int16_t *) (((char *) pd->user_struct) + pd->offset);
  2562. if (!ucl_object_toint_safe(obj, &val)) {
  2563. g_set_error(err,
  2564. CFG_RCL_ERROR,
  2565. EINVAL,
  2566. "cannot convert %s to integer in option %s",
  2567. ucl_object_type_to_string(ucl_object_type(obj)),
  2568. ucl_object_key(obj));
  2569. return FALSE;
  2570. }
  2571. *target.i16p = val;
  2572. }
  2573. else if (pd->flags == RSPAMD_CL_FLAG_UINT) {
  2574. target.up = (unsigned int *) (((char *) pd->user_struct) + pd->offset);
  2575. if (!ucl_object_toint_safe(obj, &val)) {
  2576. g_set_error(err,
  2577. CFG_RCL_ERROR,
  2578. EINVAL,
  2579. "cannot convert %s to integer in option %s",
  2580. ucl_object_type_to_string(ucl_object_type(obj)),
  2581. ucl_object_key(obj));
  2582. return FALSE;
  2583. }
  2584. *target.up = val;
  2585. }
  2586. else {
  2587. target.ip = (int *) (((char *) pd->user_struct) + pd->offset);
  2588. if (!ucl_object_toint_safe(obj, &val)) {
  2589. g_set_error(err,
  2590. CFG_RCL_ERROR,
  2591. EINVAL,
  2592. "cannot convert %s to integer in option %s",
  2593. ucl_object_type_to_string(ucl_object_type(obj)),
  2594. ucl_object_key(obj));
  2595. return FALSE;
  2596. }
  2597. *target.ip = val;
  2598. }
  2599. return TRUE;
  2600. }
  2601. gboolean
  2602. rspamd_rcl_parse_struct_double(rspamd_mempool_t *pool,
  2603. const ucl_object_t *obj,
  2604. gpointer ud,
  2605. struct rspamd_rcl_section *section,
  2606. GError **err)
  2607. {
  2608. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2609. double *target;
  2610. target = (double *) (((char *) pd->user_struct) + pd->offset);
  2611. if (!ucl_object_todouble_safe(obj, target)) {
  2612. g_set_error(err,
  2613. CFG_RCL_ERROR,
  2614. EINVAL,
  2615. "cannot convert %s to double in option %s",
  2616. ucl_object_type_to_string(ucl_object_type(obj)),
  2617. ucl_object_key(obj));
  2618. return FALSE;
  2619. }
  2620. return TRUE;
  2621. }
  2622. gboolean
  2623. rspamd_rcl_parse_struct_time(rspamd_mempool_t *pool,
  2624. const ucl_object_t *obj,
  2625. gpointer ud,
  2626. struct rspamd_rcl_section *section,
  2627. GError **err)
  2628. {
  2629. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2630. union {
  2631. int *psec;
  2632. uint32_t *pu32;
  2633. double *pdv;
  2634. struct timeval *ptv;
  2635. struct timespec *pts;
  2636. } target;
  2637. double val;
  2638. if (!ucl_object_todouble_safe(obj, &val)) {
  2639. g_set_error(err,
  2640. CFG_RCL_ERROR,
  2641. EINVAL,
  2642. "cannot convert %s to double in option %s",
  2643. ucl_object_type_to_string(ucl_object_type(obj)),
  2644. ucl_object_key(obj));
  2645. return FALSE;
  2646. }
  2647. if (pd->flags == RSPAMD_CL_FLAG_TIME_TIMEVAL) {
  2648. target.ptv =
  2649. (struct timeval *) (((char *) pd->user_struct) + pd->offset);
  2650. target.ptv->tv_sec = (glong) val;
  2651. target.ptv->tv_usec = (val - (glong) val) * 1000000;
  2652. }
  2653. else if (pd->flags == RSPAMD_CL_FLAG_TIME_TIMESPEC) {
  2654. target.pts =
  2655. (struct timespec *) (((char *) pd->user_struct) + pd->offset);
  2656. target.pts->tv_sec = (glong) val;
  2657. target.pts->tv_nsec = (val - (glong) val) * 1000000000000LL;
  2658. }
  2659. else if (pd->flags == RSPAMD_CL_FLAG_TIME_FLOAT) {
  2660. target.pdv = (double *) (((char *) pd->user_struct) + pd->offset);
  2661. *target.pdv = val;
  2662. }
  2663. else if (pd->flags == RSPAMD_CL_FLAG_TIME_INTEGER) {
  2664. target.psec = (int *) (((char *) pd->user_struct) + pd->offset);
  2665. *target.psec = val * 1000;
  2666. }
  2667. else if (pd->flags == RSPAMD_CL_FLAG_TIME_UINT_32) {
  2668. target.pu32 = (uint32_t *) (((char *) pd->user_struct) + pd->offset);
  2669. *target.pu32 = val * 1000;
  2670. }
  2671. else {
  2672. g_set_error(err,
  2673. CFG_RCL_ERROR,
  2674. EINVAL,
  2675. "cannot convert %s to time in option %s",
  2676. ucl_object_type_to_string(ucl_object_type(obj)),
  2677. ucl_object_key(obj));
  2678. return FALSE;
  2679. }
  2680. return TRUE;
  2681. }
  2682. gboolean
  2683. rspamd_rcl_parse_struct_keypair(rspamd_mempool_t *pool,
  2684. const ucl_object_t *obj,
  2685. gpointer ud,
  2686. struct rspamd_rcl_section *section,
  2687. GError **err)
  2688. {
  2689. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2690. struct rspamd_cryptobox_keypair **target, *kp;
  2691. target = (struct rspamd_cryptobox_keypair **) (((char *) pd->user_struct) +
  2692. pd->offset);
  2693. if (obj->type == UCL_OBJECT) {
  2694. kp = rspamd_keypair_from_ucl(obj);
  2695. if (kp != nullptr) {
  2696. rspamd_mempool_add_destructor(pool,
  2697. (rspamd_mempool_destruct_t) rspamd_keypair_unref, kp);
  2698. *target = kp;
  2699. }
  2700. else {
  2701. char *dump = (char *) ucl_object_emit(obj, UCL_EMIT_JSON_COMPACT);
  2702. g_set_error(err,
  2703. CFG_RCL_ERROR,
  2704. EINVAL,
  2705. "cannot load the keypair specified: %s; section: %s; value: %s",
  2706. ucl_object_key(obj), section->name.c_str(), dump);
  2707. free(dump);
  2708. return FALSE;
  2709. }
  2710. }
  2711. else {
  2712. g_set_error(err,
  2713. CFG_RCL_ERROR,
  2714. EINVAL,
  2715. "no sane pubkey or privkey found in the keypair: %s",
  2716. ucl_object_key(obj));
  2717. return FALSE;
  2718. }
  2719. return TRUE;
  2720. }
  2721. gboolean
  2722. rspamd_rcl_parse_struct_pubkey(rspamd_mempool_t *pool,
  2723. const ucl_object_t *obj,
  2724. gpointer ud,
  2725. struct rspamd_rcl_section *section,
  2726. GError **err)
  2727. {
  2728. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2729. struct rspamd_cryptobox_pubkey **target, *pk;
  2730. gsize len;
  2731. const char *str;
  2732. rspamd_cryptobox_keypair_type keypair_type = RSPAMD_KEYPAIR_KEX;
  2733. rspamd_cryptobox_mode keypair_mode = RSPAMD_CRYPTOBOX_MODE_25519;
  2734. if (pd->flags & RSPAMD_CL_FLAG_SIGNKEY) {
  2735. keypair_type = RSPAMD_KEYPAIR_SIGN;
  2736. }
  2737. if (pd->flags & RSPAMD_CL_FLAG_NISTKEY) {
  2738. keypair_mode = RSPAMD_CRYPTOBOX_MODE_NIST;
  2739. }
  2740. target = (struct rspamd_cryptobox_pubkey **) (((char *) pd->user_struct) +
  2741. pd->offset);
  2742. if (obj->type == UCL_STRING) {
  2743. str = ucl_object_tolstring(obj, &len);
  2744. pk = rspamd_pubkey_from_base32(str, len, keypair_type,
  2745. keypair_mode);
  2746. if (pk != nullptr) {
  2747. *target = pk;
  2748. }
  2749. else {
  2750. g_set_error(err,
  2751. CFG_RCL_ERROR,
  2752. EINVAL,
  2753. "cannot load the pubkey specified: %s",
  2754. ucl_object_key(obj));
  2755. return FALSE;
  2756. }
  2757. }
  2758. else {
  2759. g_set_error(err,
  2760. CFG_RCL_ERROR,
  2761. EINVAL,
  2762. "no sane pubkey found in the element: %s",
  2763. ucl_object_key(obj));
  2764. return FALSE;
  2765. }
  2766. rspamd_mempool_add_destructor(pool,
  2767. (rspamd_mempool_destruct_t) rspamd_pubkey_unref, pk);
  2768. return TRUE;
  2769. }
  2770. static void
  2771. rspamd_rcl_insert_string_list_item(gpointer *target, rspamd_mempool_t *pool,
  2772. std::string_view elt, gboolean is_hash)
  2773. {
  2774. union {
  2775. GHashTable *hv;
  2776. GList *lv;
  2777. gpointer p;
  2778. } d;
  2779. char *val;
  2780. d.p = *target;
  2781. if (is_hash) {
  2782. if (d.hv == nullptr) {
  2783. d.hv = g_hash_table_new(rspamd_str_hash, rspamd_str_equal);
  2784. rspamd_mempool_add_destructor(pool,
  2785. (rspamd_mempool_destruct_t) g_hash_table_unref, d.hv);
  2786. }
  2787. val = rspamd_mempool_strdup_len(pool, elt.data(), elt.size());
  2788. g_hash_table_insert(d.hv, val, val);
  2789. }
  2790. else {
  2791. val = rspamd_mempool_strdup_len(pool, elt.data(), elt.size());
  2792. d.lv = g_list_prepend(d.lv, val);
  2793. }
  2794. *target = d.p;
  2795. }
  2796. gboolean
  2797. rspamd_rcl_parse_struct_string_list(rspamd_mempool_t *pool,
  2798. const ucl_object_t *obj,
  2799. gpointer ud,
  2800. struct rspamd_rcl_section *section,
  2801. GError **err)
  2802. {
  2803. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2804. constexpr const auto num_str_len = 32;
  2805. auto need_destructor = true;
  2806. auto is_hash = pd->flags & RSPAMD_CL_FLAG_STRING_LIST_HASH;
  2807. auto *target = (gpointer *) (((char *) pd->user_struct) + pd->offset);
  2808. if (!is_hash && *target != nullptr) {
  2809. need_destructor = FALSE;
  2810. }
  2811. auto iter = ucl_object_iterate_new(obj);
  2812. const auto *cur = obj;
  2813. while ((cur = ucl_object_iterate_safe(iter, true)) != nullptr) {
  2814. switch (cur->type) {
  2815. case UCL_STRING: {
  2816. rspamd::string_foreach_delim(ucl_object_tostring(cur), ", ", [&](const auto &elt) {
  2817. rspamd_rcl_insert_string_list_item(target, pool, elt, is_hash);
  2818. });
  2819. /* Go to the next object */
  2820. continue;
  2821. }
  2822. case UCL_INT: {
  2823. auto *val = (char *) rspamd_mempool_alloc(pool, num_str_len);
  2824. rspamd_snprintf(val, num_str_len, "%L", cur->value.iv);
  2825. rspamd_rcl_insert_string_list_item(target, pool, val, is_hash);
  2826. break;
  2827. }
  2828. case UCL_FLOAT: {
  2829. auto *val = (char *) rspamd_mempool_alloc(pool, num_str_len);
  2830. rspamd_snprintf(val, num_str_len, "%f", cur->value.dv);
  2831. rspamd_rcl_insert_string_list_item(target, pool, val, is_hash);
  2832. break;
  2833. }
  2834. case UCL_BOOLEAN: {
  2835. auto *val = (char *) rspamd_mempool_alloc(pool, num_str_len);
  2836. rspamd_snprintf(val, num_str_len, "%s",
  2837. ((gboolean) cur->value.iv) ? "true" : "false");
  2838. rspamd_rcl_insert_string_list_item(target, pool, val, is_hash);
  2839. break;
  2840. }
  2841. default:
  2842. g_set_error(err,
  2843. CFG_RCL_ERROR,
  2844. EINVAL,
  2845. "cannot convert %s to a string list in option %s",
  2846. ucl_object_type_to_string(ucl_object_type(obj)),
  2847. ucl_object_key(obj));
  2848. ucl_object_iterate_free(iter);
  2849. return FALSE;
  2850. }
  2851. }
  2852. ucl_object_iterate_free(iter);
  2853. #if 0
  2854. /* WTF: why don't we allow empty list here?? */
  2855. if (*target == nullptr) {
  2856. g_set_error (err,
  2857. CFG_RCL_ERROR,
  2858. EINVAL,
  2859. "non-empty array of strings is expected: %s, "
  2860. "got: %s, of length: %d",
  2861. ucl_object_key (obj), ucl_object_type_to_string (obj->type),
  2862. obj->len);
  2863. return FALSE;
  2864. }
  2865. #endif
  2866. if (!is_hash && *target != nullptr) {
  2867. *target = g_list_reverse(*(GList **) target);
  2868. if (need_destructor) {
  2869. rspamd_mempool_add_destructor(pool,
  2870. (rspamd_mempool_destruct_t) g_list_free,
  2871. *target);
  2872. }
  2873. }
  2874. return TRUE;
  2875. }
  2876. gboolean
  2877. rspamd_rcl_parse_struct_ucl(rspamd_mempool_t *pool,
  2878. const ucl_object_t *obj,
  2879. gpointer ud,
  2880. struct rspamd_rcl_section *section,
  2881. GError **err)
  2882. {
  2883. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2884. const ucl_object_t **target;
  2885. target = (const ucl_object_t **) (((char *) pd->user_struct) + pd->offset);
  2886. *target = obj;
  2887. return TRUE;
  2888. }
  2889. gboolean
  2890. rspamd_rcl_parse_struct_boolean(rspamd_mempool_t *pool,
  2891. const ucl_object_t *obj,
  2892. gpointer ud,
  2893. struct rspamd_rcl_section *section,
  2894. GError **err)
  2895. {
  2896. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2897. gboolean *target;
  2898. target = (gboolean *) (((char *) pd->user_struct) + pd->offset);
  2899. if (obj->type == UCL_BOOLEAN) {
  2900. *target = obj->value.iv;
  2901. }
  2902. else if (obj->type == UCL_INT) {
  2903. *target = obj->value.iv;
  2904. }
  2905. else {
  2906. g_set_error(err,
  2907. CFG_RCL_ERROR,
  2908. EINVAL,
  2909. "cannot convert %s to boolean in option %s",
  2910. ucl_object_type_to_string(ucl_object_type(obj)),
  2911. ucl_object_key(obj));
  2912. return FALSE;
  2913. }
  2914. if (pd->flags & RSPAMD_CL_FLAG_BOOLEAN_INVERSE) {
  2915. *target = !*target;
  2916. }
  2917. return TRUE;
  2918. }
  2919. gboolean
  2920. rspamd_rcl_parse_struct_addr(rspamd_mempool_t *pool,
  2921. const ucl_object_t *obj,
  2922. gpointer ud,
  2923. struct rspamd_rcl_section *section,
  2924. GError **err)
  2925. {
  2926. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2927. rspamd_inet_addr_t **target;
  2928. const char *val;
  2929. gsize size;
  2930. target = (rspamd_inet_addr_t **) (((char *) pd->user_struct) + pd->offset);
  2931. if (ucl_object_type(obj) == UCL_STRING) {
  2932. val = ucl_object_tolstring(obj, &size);
  2933. if (!rspamd_parse_inet_address(target, val, size,
  2934. RSPAMD_INET_ADDRESS_PARSE_DEFAULT)) {
  2935. g_set_error(err,
  2936. CFG_RCL_ERROR,
  2937. EINVAL,
  2938. "cannot parse inet address: %s", val);
  2939. return FALSE;
  2940. }
  2941. }
  2942. else {
  2943. g_set_error(err,
  2944. CFG_RCL_ERROR,
  2945. EINVAL,
  2946. "cannot convert %s to inet address in option %s",
  2947. ucl_object_type_to_string(ucl_object_type(obj)),
  2948. ucl_object_key(obj));
  2949. return FALSE;
  2950. }
  2951. return TRUE;
  2952. }
  2953. gboolean
  2954. rspamd_rcl_parse_struct_mime_addr(rspamd_mempool_t *pool,
  2955. const ucl_object_t *obj,
  2956. gpointer ud,
  2957. struct rspamd_rcl_section *section,
  2958. GError **err)
  2959. {
  2960. auto *pd = (struct rspamd_rcl_struct_parser *) ud;
  2961. GPtrArray **target, *tmp_addr = nullptr;
  2962. const char *val;
  2963. ucl_object_iter_t it;
  2964. const ucl_object_t *cur;
  2965. target = (GPtrArray **) (((char *) pd->user_struct) + pd->offset);
  2966. it = ucl_object_iterate_new(obj);
  2967. while ((cur = ucl_object_iterate_safe(it, true)) != nullptr) {
  2968. if (ucl_object_type(cur) == UCL_STRING) {
  2969. val = ucl_object_tostring(obj);
  2970. tmp_addr = rspamd_email_address_from_mime(pool, val,
  2971. strlen(val), tmp_addr, -1);
  2972. }
  2973. else {
  2974. g_set_error(err,
  2975. CFG_RCL_ERROR,
  2976. EINVAL,
  2977. "cannot get inet address from ucl object in %s",
  2978. ucl_object_key(obj));
  2979. ucl_object_iterate_free(it);
  2980. return FALSE;
  2981. }
  2982. }
  2983. ucl_object_iterate_free(it);
  2984. *target = tmp_addr;
  2985. return TRUE;
  2986. }
  2987. void rspamd_rcl_register_worker_option(struct rspamd_config *cfg,
  2988. GQuark type,
  2989. const char *name,
  2990. rspamd_rcl_default_handler_t handler,
  2991. gpointer target,
  2992. glong offset,
  2993. int flags,
  2994. const char *doc_string)
  2995. {
  2996. auto parser_it = cfg->rcl_top_section->workers_parser.try_emplace(type, rspamd_worker_cfg_parser{});
  2997. auto &parser = parser_it.first->second;
  2998. auto handler_it = parser.parsers.try_emplace(std::make_pair(std::string{name}, target), rspamd_worker_param_parser{});
  2999. if (!handler_it.second) {
  3000. msg_warn_config(
  3001. "handler for parameter %s is already registered for worker type %s",
  3002. name,
  3003. g_quark_to_string(type));
  3004. return;
  3005. }
  3006. auto &nhandler = handler_it.first->second;
  3007. nhandler.parser.flags = flags;
  3008. nhandler.parser.offset = offset;
  3009. nhandler.parser.user_struct = target;
  3010. nhandler.handler = handler;
  3011. const auto *doc_workers = ucl_object_lookup(cfg->doc_strings, "workers");
  3012. if (doc_workers == nullptr) {
  3013. auto *doc_obj = ucl_object_typed_new(UCL_OBJECT);
  3014. ucl_object_insert_key(cfg->doc_strings, doc_obj, "workers", 0, false);
  3015. doc_workers = doc_obj;
  3016. }
  3017. const auto *doc_target = ucl_object_lookup(doc_workers, g_quark_to_string(type));
  3018. if (doc_target == nullptr) {
  3019. auto *doc_obj = ucl_object_typed_new(UCL_OBJECT);
  3020. ucl_object_insert_key((ucl_object_t *) doc_workers, doc_obj,
  3021. g_quark_to_string(type), 0, true);
  3022. doc_target = doc_obj;
  3023. }
  3024. rspamd_rcl_add_doc_obj((ucl_object_t *) doc_target,
  3025. doc_string,
  3026. name,
  3027. UCL_NULL,
  3028. handler,
  3029. flags,
  3030. nullptr,
  3031. 0);
  3032. }
  3033. /* Checksum functions */
  3034. static int
  3035. rspamd_rcl_emitter_append_c(unsigned char c, size_t nchars, void *ud)
  3036. {
  3037. auto *hs = (rspamd_cryptobox_hash_state_t *) ud;
  3038. uint64_t d[2];
  3039. d[0] = nchars;
  3040. d[1] = c;
  3041. rspamd_cryptobox_hash_update(hs, (const unsigned char *) d, sizeof(d));
  3042. return 0;
  3043. }
  3044. static int
  3045. rspamd_rcl_emitter_append_len(unsigned const char *str, size_t len, void *ud)
  3046. {
  3047. auto *hs = (rspamd_cryptobox_hash_state_t *) ud;
  3048. rspamd_cryptobox_hash_update(hs, str, len);
  3049. return 0;
  3050. }
  3051. static int
  3052. rspamd_rcl_emitter_append_int(int64_t elt, void *ud)
  3053. {
  3054. auto *hs = (rspamd_cryptobox_hash_state_t *) ud;
  3055. rspamd_cryptobox_hash_update(hs, (const unsigned char *) &elt, sizeof(elt));
  3056. return 0;
  3057. }
  3058. static int
  3059. rspamd_rcl_emitter_append_double(double elt, void *ud)
  3060. {
  3061. auto *hs = (rspamd_cryptobox_hash_state_t *) ud;
  3062. rspamd_cryptobox_hash_update(hs, (const unsigned char *) &elt, sizeof(elt));
  3063. return 0;
  3064. }
  3065. void rspamd_rcl_sections_free(struct rspamd_rcl_sections_map *sections)
  3066. {
  3067. delete sections;
  3068. }
  3069. /**
  3070. * Calls for an external lua function to apply potential config transformations
  3071. * if needed. This function can change the cfg->rcl_obj.
  3072. *
  3073. * Example of transformation function:
  3074. *
  3075. * function(obj)
  3076. * if obj.something == 'foo' then
  3077. * obj.something = "bla"
  3078. * return true, obj
  3079. * end
  3080. *
  3081. * return false, nil
  3082. * end
  3083. *
  3084. * If function returns 'false' then rcl_obj is not touched. Otherwise,
  3085. * it is changed, then rcl_obj is imported from lua. Old config is dereferenced.
  3086. * @param cfg
  3087. */
  3088. void rspamd_rcl_maybe_apply_lua_transform(struct rspamd_config *cfg)
  3089. {
  3090. auto *L = RSPAMD_LUA_CFG_STATE(cfg);
  3091. static const char *transform_script = "lua_cfg_transform";
  3092. g_assert(L != nullptr);
  3093. if (!rspamd_lua_require_function(L, transform_script, nullptr)) {
  3094. /* No function defined */
  3095. msg_warn_config("cannot execute lua script %s: %s",
  3096. transform_script, lua_tostring(L, -1));
  3097. return;
  3098. }
  3099. lua_pushcfunction(L, &rspamd_lua_traceback);
  3100. auto err_idx = lua_gettop(L);
  3101. /* Push function */
  3102. lua_pushvalue(L, -2);
  3103. /* Push the existing config */
  3104. ucl_object_push_lua(L, cfg->cfg_ucl_obj, true);
  3105. if (auto ret = lua_pcall(L, 1, 2, err_idx); ret != 0) {
  3106. msg_err("call to rspamadm lua script failed (%d): %s", ret,
  3107. lua_tostring(L, -1));
  3108. lua_settop(L, 0);
  3109. return;
  3110. }
  3111. if (lua_toboolean(L, -2) && lua_type(L, -1) == LUA_TTABLE) {
  3112. ucl_object_t *old_cfg = cfg->cfg_ucl_obj;
  3113. msg_info_config("configuration has been transformed in Lua");
  3114. cfg->cfg_ucl_obj = ucl_object_lua_import(L, -1);
  3115. ucl_object_unref(old_cfg);
  3116. }
  3117. /* error function */
  3118. lua_settop(L, 0);
  3119. }
  3120. static bool
  3121. rspamd_rcl_decrypt_handler(struct ucl_parser *parser,
  3122. const unsigned char *source, size_t source_len,
  3123. unsigned char **destination, size_t *dest_len,
  3124. void *user_data)
  3125. {
  3126. GError *err = nullptr;
  3127. auto *kp = (struct rspamd_cryptobox_keypair *) user_data;
  3128. if (!rspamd_keypair_decrypt(kp, source, source_len,
  3129. destination, dest_len, &err)) {
  3130. msg_err("cannot decrypt file: %e", err);
  3131. g_error_free(err);
  3132. return false;
  3133. }
  3134. return true;
  3135. }
  3136. static bool
  3137. rspamd_rcl_jinja_handler(struct ucl_parser *parser,
  3138. const unsigned char *source, size_t source_len,
  3139. unsigned char **destination, size_t *dest_len,
  3140. void *user_data)
  3141. {
  3142. auto *cfg = (struct rspamd_config *) user_data;
  3143. auto *L = RSPAMD_LUA_CFG_STATE(cfg);
  3144. lua_pushcfunction(L, &rspamd_lua_traceback);
  3145. auto err_idx = lua_gettop(L);
  3146. /* Obtain function */
  3147. if (!rspamd_lua_require_function(L, "lua_util", "jinja_template")) {
  3148. msg_err_config("cannot require lua_util.jinja_template");
  3149. lua_settop(L, err_idx - 1);
  3150. return false;
  3151. }
  3152. lua_pushlstring(L, (const char *) source, source_len);
  3153. lua_getglobal(L, "rspamd_env");
  3154. lua_pushboolean(L, false);
  3155. if (lua_pcall(L, 3, 1, err_idx) != 0) {
  3156. msg_err_config("cannot call lua jinja_template script: %s",
  3157. lua_tostring(L, -1));
  3158. lua_settop(L, err_idx - 1);
  3159. return false;
  3160. }
  3161. if (lua_type(L, -1) == LUA_TSTRING) {
  3162. const char *ndata;
  3163. gsize nsize;
  3164. ndata = lua_tolstring(L, -1, &nsize);
  3165. *destination = (unsigned char *) UCL_ALLOC(nsize);
  3166. memcpy(*destination, ndata, nsize);
  3167. *dest_len = nsize;
  3168. }
  3169. else {
  3170. msg_err_config("invalid return type when templating jinja %s",
  3171. lua_typename(L, lua_type(L, -1)));
  3172. lua_settop(L, err_idx - 1);
  3173. return false;
  3174. }
  3175. lua_settop(L, err_idx - 1);
  3176. return true;
  3177. }
  3178. static void
  3179. rspamd_rcl_decrypt_free(unsigned char *data, size_t len, void *user_data)
  3180. {
  3181. g_free(data);
  3182. }
  3183. void rspamd_config_calculate_cksum(struct rspamd_config *cfg)
  3184. {
  3185. rspamd_cryptobox_hash_state_t hs;
  3186. unsigned char cksumbuf[rspamd_cryptobox_HASHBYTES];
  3187. struct ucl_emitter_functions f;
  3188. /* Calculate checksum */
  3189. rspamd_cryptobox_hash_init(&hs, nullptr, 0);
  3190. f.ucl_emitter_append_character = rspamd_rcl_emitter_append_c;
  3191. f.ucl_emitter_append_double = rspamd_rcl_emitter_append_double;
  3192. f.ucl_emitter_append_int = rspamd_rcl_emitter_append_int;
  3193. f.ucl_emitter_append_len = rspamd_rcl_emitter_append_len;
  3194. f.ucl_emitter_free_func = nullptr;
  3195. f.ud = &hs;
  3196. ucl_object_emit_full(cfg->cfg_ucl_obj, UCL_EMIT_MSGPACK,
  3197. &f, cfg->config_comments);
  3198. rspamd_cryptobox_hash_final(&hs, cksumbuf);
  3199. cfg->checksum = rspamd_encode_base32(cksumbuf, sizeof(cksumbuf), RSPAMD_BASE32_DEFAULT);
  3200. /* Also change the tag of cfg pool to be equal to the checksum */
  3201. rspamd_strlcpy(cfg->cfg_pool->tag.uid, cfg->checksum,
  3202. MIN(sizeof(cfg->cfg_pool->tag.uid), strlen(cfg->checksum)));
  3203. }
  3204. gboolean
  3205. rspamd_config_parse_ucl(struct rspamd_config *cfg,
  3206. const char *filename,
  3207. GHashTable *vars,
  3208. ucl_include_trace_func_t inc_trace,
  3209. void *trace_data,
  3210. gboolean skip_jinja,
  3211. GError **err)
  3212. {
  3213. struct rspamd_cryptobox_keypair *decrypt_keypair = nullptr;
  3214. auto cfg_file_maybe = rspamd::util::raii_mmaped_file::mmap_shared(filename, O_RDONLY, PROT_READ, 0);
  3215. if (!cfg_file_maybe) {
  3216. g_set_error(err, cfg_rcl_error_quark(), errno,
  3217. "cannot open %s: %*s", filename, (int) cfg_file_maybe.error().error_message.size(),
  3218. cfg_file_maybe.error().error_message.data());
  3219. return FALSE;
  3220. }
  3221. auto &cfg_file = cfg_file_maybe.value();
  3222. /* Try to load keyfile if available */
  3223. rspamd::util::raii_file::open(fmt::format("{}.key", filename), O_RDONLY).map([&](const auto &keyfile) {
  3224. auto *kp_parser = ucl_parser_new(0);
  3225. if (ucl_parser_add_fd(kp_parser, keyfile.get_fd())) {
  3226. auto *kp_obj = ucl_parser_get_object(kp_parser);
  3227. g_assert(kp_obj != nullptr);
  3228. decrypt_keypair = rspamd_keypair_from_ucl(kp_obj);
  3229. if (decrypt_keypair == nullptr) {
  3230. msg_err_config_forced("cannot load keypair from %s.key: invalid keypair",
  3231. filename);
  3232. }
  3233. else {
  3234. /* Add decryption support to UCL */
  3235. rspamd_mempool_add_destructor(cfg->cfg_pool,
  3236. (rspamd_mempool_destruct_t) rspamd_keypair_unref,
  3237. decrypt_keypair);
  3238. }
  3239. ucl_object_unref(kp_obj);
  3240. }
  3241. else {
  3242. msg_err_config_forced("cannot load keypair from %s.key: %s",
  3243. filename, ucl_parser_get_error(kp_parser));
  3244. }
  3245. ucl_parser_free(kp_parser);
  3246. });
  3247. auto parser = std::shared_ptr<ucl_parser>(ucl_parser_new(UCL_PARSER_SAVE_COMMENTS), ucl_parser_free);
  3248. rspamd_ucl_add_conf_variables(parser.get(), vars);
  3249. rspamd_ucl_add_conf_macros(parser.get(), cfg);
  3250. ucl_parser_set_filevars(parser.get(), filename, true);
  3251. if (inc_trace) {
  3252. ucl_parser_set_include_tracer(parser.get(), inc_trace, trace_data);
  3253. }
  3254. if (decrypt_keypair) {
  3255. auto *decrypt_handler = rspamd_mempool_alloc0_type(cfg->cfg_pool,
  3256. struct ucl_parser_special_handler);
  3257. decrypt_handler->user_data = decrypt_keypair;
  3258. decrypt_handler->magic = encrypted_magic;
  3259. decrypt_handler->magic_len = sizeof(encrypted_magic);
  3260. decrypt_handler->handler = rspamd_rcl_decrypt_handler;
  3261. decrypt_handler->free_function = rspamd_rcl_decrypt_free;
  3262. ucl_parser_add_special_handler(parser.get(), decrypt_handler);
  3263. }
  3264. if (!skip_jinja) {
  3265. auto *jinja_handler = rspamd_mempool_alloc0_type(cfg->cfg_pool,
  3266. struct ucl_parser_special_handler);
  3267. jinja_handler->user_data = cfg;
  3268. jinja_handler->flags = UCL_SPECIAL_HANDLER_PREPROCESS_ALL;
  3269. jinja_handler->handler = rspamd_rcl_jinja_handler;
  3270. ucl_parser_add_special_handler(parser.get(), jinja_handler);
  3271. }
  3272. if (!ucl_parser_add_chunk(parser.get(), (unsigned char *) cfg_file.get_map(), cfg_file.get_size())) {
  3273. g_set_error(err, cfg_rcl_error_quark(), errno,
  3274. "ucl parser error: %s", ucl_parser_get_error(parser.get()));
  3275. return FALSE;
  3276. }
  3277. cfg->cfg_ucl_obj = ucl_parser_get_object(parser.get());
  3278. cfg->config_comments = ucl_object_ref(ucl_parser_get_comments(parser.get()));
  3279. return TRUE;
  3280. }
  3281. gboolean
  3282. rspamd_config_read(struct rspamd_config *cfg,
  3283. const char *filename,
  3284. rspamd_rcl_section_fin_t logger_fin,
  3285. gpointer logger_ud,
  3286. GHashTable *vars,
  3287. gboolean skip_jinja,
  3288. char **lua_env)
  3289. {
  3290. GError *err = nullptr;
  3291. rspamd_lua_set_path(RSPAMD_LUA_CFG_STATE(cfg), nullptr, vars);
  3292. if (!rspamd_lua_set_env(RSPAMD_LUA_CFG_STATE(cfg), vars, lua_env, &err)) {
  3293. msg_err_config_forced("failed to set up environment: %e", err);
  3294. g_error_free(err);
  3295. return FALSE;
  3296. }
  3297. if (!rspamd_config_parse_ucl(cfg, filename, vars, nullptr, nullptr, skip_jinja, &err)) {
  3298. msg_err_config_forced("failed to load config: %e", err);
  3299. g_error_free(err);
  3300. return FALSE;
  3301. }
  3302. auto *top = rspamd_rcl_config_init(cfg, nullptr);
  3303. cfg->rcl_top_section = top;
  3304. /* Add new paths if defined in options */
  3305. rspamd_lua_set_path(RSPAMD_LUA_CFG_STATE(cfg), cfg->cfg_ucl_obj, vars);
  3306. rspamd_lua_set_globals(cfg, RSPAMD_LUA_CFG_STATE(cfg));
  3307. rspamd_mempool_add_destructor(cfg->cfg_pool, (rspamd_mempool_destruct_t) rspamd_rcl_sections_free, top);
  3308. err = nullptr;
  3309. /* Pre-init logging if possible */
  3310. if (logger_fin != nullptr) {
  3311. auto logging_section_maybe = rspamd::find_map(top->sections, "logging");
  3312. if (logging_section_maybe) {
  3313. const auto *logger_obj = ucl_object_lookup_any(cfg->cfg_ucl_obj, "logging",
  3314. "logger", nullptr);
  3315. if (logger_obj == nullptr) {
  3316. logger_fin(cfg->cfg_pool, logger_ud);
  3317. }
  3318. else {
  3319. if (!rspamd_rcl_process_section(cfg, *logging_section_maybe.value().get().get(), cfg,
  3320. logger_obj, cfg->cfg_pool, &err)) {
  3321. msg_err_config_forced("cannot init logger: %e", err);
  3322. g_error_free(err);
  3323. return FALSE;
  3324. }
  3325. else {
  3326. logger_fin(cfg->cfg_pool, logger_ud);
  3327. }
  3328. /* Init lua logging */
  3329. lua_pushcfunction(RSPAMD_LUA_CFG_STATE(cfg), &rspamd_lua_traceback);
  3330. auto err_idx = lua_gettop(RSPAMD_LUA_CFG_STATE(cfg));
  3331. /* Obtain function */
  3332. if (!rspamd_lua_require_function(RSPAMD_LUA_CFG_STATE(cfg), "lua_util",
  3333. "init_debug_logging")) {
  3334. msg_err_config("cannot require lua_util.init_debug_logging");
  3335. lua_settop(RSPAMD_LUA_CFG_STATE(cfg), err_idx - 1);
  3336. return FALSE;
  3337. }
  3338. void *pcfg = lua_newuserdata(RSPAMD_LUA_CFG_STATE(cfg), sizeof(void *));
  3339. memcpy(pcfg, &cfg, sizeof(void *));
  3340. rspamd_lua_setclass(RSPAMD_LUA_CFG_STATE(cfg), rspamd_config_classname, -1);
  3341. if (lua_pcall(RSPAMD_LUA_CFG_STATE(cfg), 1, 0, err_idx) != 0) {
  3342. msg_err_config("cannot call lua init_debug_logging script: %s",
  3343. lua_tostring(RSPAMD_LUA_CFG_STATE(cfg), -1));
  3344. lua_settop(RSPAMD_LUA_CFG_STATE(cfg), err_idx - 1);
  3345. return FALSE;
  3346. }
  3347. lua_settop(RSPAMD_LUA_CFG_STATE(cfg), err_idx - 1);
  3348. }
  3349. }
  3350. }
  3351. /* Transform config if needed */
  3352. rspamd_rcl_maybe_apply_lua_transform(cfg);
  3353. rspamd_config_calculate_cksum(cfg);
  3354. if (!rspamd_rcl_parse(top, cfg, cfg, cfg->cfg_pool, cfg->cfg_ucl_obj, &err)) {
  3355. msg_err_config("rcl parse error: %e", err);
  3356. if (err) {
  3357. g_error_free(err);
  3358. }
  3359. return FALSE;
  3360. }
  3361. cfg->lang_det = rspamd_language_detector_init(cfg);
  3362. rspamd_mempool_add_destructor(cfg->cfg_pool,
  3363. (rspamd_mempool_destruct_t) rspamd_language_detector_unref,
  3364. cfg->lang_det);
  3365. return TRUE;
  3366. }
  3367. static void
  3368. rspamd_rcl_doc_obj_from_handler(ucl_object_t *doc_obj,
  3369. rspamd_rcl_default_handler_t handler,
  3370. int flags)
  3371. {
  3372. auto has_example = ucl_object_lookup(doc_obj, "example") != nullptr;
  3373. auto has_type = ucl_object_lookup(doc_obj, "type") != nullptr;
  3374. if (handler == rspamd_rcl_parse_struct_string) {
  3375. if (!has_type) {
  3376. ucl_object_insert_key(doc_obj, ucl_object_fromstring("string"),
  3377. "type", 0, false);
  3378. }
  3379. }
  3380. else if (handler == rspamd_rcl_parse_struct_integer) {
  3381. auto *type = "int";
  3382. if (flags & RSPAMD_CL_FLAG_INT_16) {
  3383. type = "int16";
  3384. }
  3385. else if (flags & RSPAMD_CL_FLAG_INT_32) {
  3386. type = "int32";
  3387. }
  3388. else if (flags & RSPAMD_CL_FLAG_INT_64) {
  3389. type = "int64";
  3390. }
  3391. else if (flags & RSPAMD_CL_FLAG_INT_SIZE) {
  3392. type = "size";
  3393. }
  3394. else if (flags & RSPAMD_CL_FLAG_UINT) {
  3395. type = "uint";
  3396. }
  3397. if (!has_type) {
  3398. ucl_object_insert_key(doc_obj, ucl_object_fromstring(type),
  3399. "type", 0, false);
  3400. }
  3401. }
  3402. else if (handler == rspamd_rcl_parse_struct_double) {
  3403. if (!has_type) {
  3404. ucl_object_insert_key(doc_obj, ucl_object_fromstring("double"),
  3405. "type", 0, false);
  3406. }
  3407. }
  3408. else if (handler == rspamd_rcl_parse_struct_time) {
  3409. auto *type = "time";
  3410. if (!has_type) {
  3411. ucl_object_insert_key(doc_obj, ucl_object_fromstring(type),
  3412. "type", 0, false);
  3413. }
  3414. }
  3415. else if (handler == rspamd_rcl_parse_struct_string_list) {
  3416. if (!has_type) {
  3417. ucl_object_insert_key(doc_obj, ucl_object_fromstring("string list"),
  3418. "type", 0, false);
  3419. }
  3420. if (!has_example) {
  3421. ucl_object_insert_key(doc_obj,
  3422. ucl_object_fromstring_common("param = \"str1, str2, str3\" OR "
  3423. "param = [\"str1\", \"str2\", \"str3\"]",
  3424. 0, static_cast<ucl_string_flags>(0)),
  3425. "example",
  3426. 0,
  3427. false);
  3428. }
  3429. }
  3430. else if (handler == rspamd_rcl_parse_struct_boolean) {
  3431. if (!has_type) {
  3432. ucl_object_insert_key(doc_obj,
  3433. ucl_object_fromstring("bool"),
  3434. "type",
  3435. 0,
  3436. false);
  3437. }
  3438. }
  3439. else if (handler == rspamd_rcl_parse_struct_keypair) {
  3440. if (!has_type) {
  3441. ucl_object_insert_key(doc_obj,
  3442. ucl_object_fromstring("keypair"),
  3443. "type",
  3444. 0,
  3445. false);
  3446. }
  3447. if (!has_example) {
  3448. ucl_object_insert_key(doc_obj,
  3449. ucl_object_fromstring("keypair { "
  3450. "pubkey = <base32_string>;"
  3451. " privkey = <base32_string>; "
  3452. "}"),
  3453. "example",
  3454. 0,
  3455. false);
  3456. }
  3457. }
  3458. else if (handler == rspamd_rcl_parse_struct_addr) {
  3459. if (!has_type) {
  3460. ucl_object_insert_key(doc_obj,
  3461. ucl_object_fromstring("socket address"),
  3462. "type",
  3463. 0,
  3464. false);
  3465. }
  3466. }
  3467. else if (handler == rspamd_rcl_parse_struct_mime_addr) {
  3468. if (!has_type) {
  3469. ucl_object_insert_key(doc_obj,
  3470. ucl_object_fromstring("email address"),
  3471. "type",
  3472. 0,
  3473. false);
  3474. }
  3475. }
  3476. }
  3477. ucl_object_t *
  3478. rspamd_rcl_add_doc_obj(ucl_object_t *doc_target,
  3479. const char *doc_string,
  3480. const char *doc_name,
  3481. ucl_type_t type,
  3482. rspamd_rcl_default_handler_t handler,
  3483. int flags,
  3484. const char *default_value,
  3485. gboolean required)
  3486. {
  3487. ucl_object_t *doc_obj;
  3488. if (doc_target == nullptr || doc_name == nullptr) {
  3489. return nullptr;
  3490. }
  3491. doc_obj = ucl_object_typed_new(UCL_OBJECT);
  3492. /* Insert doc string itself */
  3493. if (doc_string) {
  3494. ucl_object_insert_key(doc_obj,
  3495. ucl_object_fromstring_common(doc_string, 0, static_cast<ucl_string_flags>(0)),
  3496. "data", 0, false);
  3497. }
  3498. else {
  3499. ucl_object_insert_key(doc_obj, ucl_object_fromstring("undocumented"),
  3500. "data", 0, false);
  3501. }
  3502. if (type != UCL_NULL) {
  3503. ucl_object_insert_key(doc_obj,
  3504. ucl_object_fromstring(ucl_object_type_to_string(type)),
  3505. "type", 0, false);
  3506. }
  3507. rspamd_rcl_doc_obj_from_handler(doc_obj, handler, flags);
  3508. ucl_object_insert_key(doc_obj,
  3509. ucl_object_frombool(required),
  3510. "required", 0, false);
  3511. if (default_value) {
  3512. ucl_object_insert_key(doc_obj,
  3513. ucl_object_fromstring_common(default_value, 0, static_cast<ucl_string_flags>(0)),
  3514. "default", 0, false);
  3515. }
  3516. ucl_object_insert_key(doc_target, doc_obj, doc_name, 0, true);
  3517. return doc_obj;
  3518. }
  3519. ucl_object_t *
  3520. rspamd_rcl_add_doc_by_path(struct rspamd_config *cfg,
  3521. const char *doc_path,
  3522. const char *doc_string,
  3523. const char *doc_name,
  3524. ucl_type_t type,
  3525. rspamd_rcl_default_handler_t handler,
  3526. int flags,
  3527. const char *default_value,
  3528. gboolean required)
  3529. {
  3530. const auto *cur = cfg->doc_strings;
  3531. if (doc_path == nullptr) {
  3532. /* Assume top object */
  3533. return rspamd_rcl_add_doc_obj(cfg->doc_strings,
  3534. doc_string,
  3535. doc_name,
  3536. type,
  3537. handler,
  3538. flags,
  3539. default_value,
  3540. required);
  3541. }
  3542. else {
  3543. const auto *found = ucl_object_lookup_path(cfg->doc_strings, doc_path);
  3544. if (found != nullptr) {
  3545. return rspamd_rcl_add_doc_obj((ucl_object_t *) found,
  3546. doc_string,
  3547. doc_name,
  3548. type,
  3549. handler,
  3550. flags,
  3551. default_value,
  3552. required);
  3553. }
  3554. /* Otherwise we need to insert all components of the path */
  3555. rspamd::string_foreach_delim(doc_path, ".", [&](const std::string_view &elt) {
  3556. if (ucl_object_type(cur) != UCL_OBJECT) {
  3557. msg_err_config("Bad path while lookup for '%s' at %*s",
  3558. doc_path, (int) elt.size(), elt.data());
  3559. }
  3560. const auto *found = ucl_object_lookup_len(cur, elt.data(), elt.size());
  3561. if (found == nullptr) {
  3562. auto *obj = ucl_object_typed_new(UCL_OBJECT);
  3563. ucl_object_insert_key((ucl_object_t *) cur,
  3564. obj,
  3565. elt.data(),
  3566. elt.size(),
  3567. true);
  3568. cur = obj;
  3569. }
  3570. else {
  3571. cur = found;
  3572. }
  3573. });
  3574. }
  3575. return rspamd_rcl_add_doc_obj(ucl_object_ref(cur),
  3576. doc_string,
  3577. doc_name,
  3578. type,
  3579. handler,
  3580. flags,
  3581. default_value,
  3582. required);
  3583. }
  3584. static void
  3585. rspamd_rcl_add_doc_from_comments(struct rspamd_config *cfg,
  3586. ucl_object_t *top_doc, const ucl_object_t *obj,
  3587. const ucl_object_t *comments, gboolean is_top)
  3588. {
  3589. ucl_object_iter_t it = nullptr;
  3590. const ucl_object_t *cur, *cmt;
  3591. ucl_object_t *cur_doc;
  3592. if (ucl_object_type(obj) == UCL_OBJECT) {
  3593. while ((cur = ucl_object_iterate(obj, &it, true)) != nullptr) {
  3594. cur_doc = nullptr;
  3595. if ((cmt = ucl_comments_find(comments, cur)) != nullptr) {
  3596. cur_doc = rspamd_rcl_add_doc_obj(top_doc,
  3597. ucl_object_tostring(cmt), ucl_object_key(cur),
  3598. ucl_object_type(cur), nullptr, 0, nullptr, FALSE);
  3599. }
  3600. if (ucl_object_type(cur) == UCL_OBJECT) {
  3601. if (cur_doc) {
  3602. rspamd_rcl_add_doc_from_comments(cfg, cur_doc, cur,
  3603. comments,
  3604. FALSE);
  3605. }
  3606. else {
  3607. rspamd_rcl_add_doc_from_comments(cfg, top_doc, cur,
  3608. comments,
  3609. FALSE);
  3610. }
  3611. }
  3612. }
  3613. }
  3614. else if (!is_top) {
  3615. if ((cmt = ucl_comments_find(comments, obj)) != nullptr) {
  3616. rspamd_rcl_add_doc_obj(top_doc,
  3617. ucl_object_tostring(cmt), ucl_object_key(obj),
  3618. ucl_object_type(obj), nullptr, 0, nullptr, FALSE);
  3619. }
  3620. }
  3621. }
  3622. ucl_object_t *
  3623. rspamd_rcl_add_doc_by_example(struct rspamd_config *cfg,
  3624. const char *root_path,
  3625. const char *doc_string,
  3626. const char *doc_name,
  3627. const char *example_data, gsize example_len)
  3628. {
  3629. auto parser = std::shared_ptr<ucl_parser>(ucl_parser_new(UCL_PARSER_NO_FILEVARS | UCL_PARSER_SAVE_COMMENTS), ucl_parser_free);
  3630. if (!ucl_parser_add_chunk(parser.get(), reinterpret_cast<const unsigned char *>(example_data), example_len)) {
  3631. msg_err_config("cannot parse example: %s",
  3632. ucl_parser_get_error(parser.get()));
  3633. return nullptr;
  3634. }
  3635. auto *top = ucl_parser_get_object(parser.get());
  3636. const auto *comments = ucl_parser_get_comments(parser.get());
  3637. /* Add top object */
  3638. auto *top_doc = rspamd_rcl_add_doc_by_path(cfg, root_path, doc_string,
  3639. doc_name, ucl_object_type(top), nullptr, 0, nullptr, FALSE);
  3640. ucl_object_insert_key(top_doc,
  3641. ucl_object_fromstring_common(example_data, example_len, static_cast<ucl_string_flags>(0)),
  3642. "example", 0, false);
  3643. rspamd_rcl_add_doc_from_comments(cfg, top_doc, top, comments, TRUE);
  3644. return top_doc;
  3645. }