You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd_proxy.c 65KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495
  1. /*
  2. * Copyright 2024 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "libutil/util.h"
  18. #include "libserver/maps/map.h"
  19. #include "libutil/upstream.h"
  20. #include "libserver/http/http_connection.h"
  21. #include "libserver/http/http_private.h"
  22. #include "libserver/protocol.h"
  23. #include "libserver/protocol_internal.h"
  24. #include "libserver/cfg_file.h"
  25. #include "libserver/url.h"
  26. #include "libserver/dns.h"
  27. #include "libmime/message.h"
  28. #include "rspamd.h"
  29. #include "libserver/worker_util.h"
  30. #include "worker_private.h"
  31. #include "lua/lua_common.h"
  32. #include "keypairs_cache.h"
  33. #include "libstat/stat_api.h"
  34. #include "ottery.h"
  35. #include "unix-std.h"
  36. #include "libserver/milter.h"
  37. #include "libserver/milter_internal.h"
  38. #include "libmime/lang_detection.h"
  39. #include <math.h>
  40. #ifdef HAVE_NETINET_TCP_H
  41. #include <netinet/tcp.h> /* for TCP_NODELAY */
  42. #endif
  43. #ifdef SYS_ZSTD
  44. #include "zstd.h"
  45. #else
  46. #include "contrib/zstd/zstd.h"
  47. #endif
  48. /* Rotate keys each minute by default */
  49. #define DEFAULT_ROTATION_TIME 60.0
  50. #define DEFAULT_RETRIES 5
  51. #define msg_err_session(...) rspamd_default_log_function(G_LOG_LEVEL_CRITICAL, \
  52. session->pool->tag.tagname, session->pool->tag.uid, \
  53. RSPAMD_LOG_FUNC, \
  54. __VA_ARGS__)
  55. #define msg_warn_session(...) rspamd_default_log_function(G_LOG_LEVEL_WARNING, \
  56. session->pool->tag.tagname, session->pool->tag.uid, \
  57. RSPAMD_LOG_FUNC, \
  58. __VA_ARGS__)
  59. #define msg_info_session(...) rspamd_default_log_function(G_LOG_LEVEL_INFO, \
  60. session->pool->tag.tagname, session->pool->tag.uid, \
  61. RSPAMD_LOG_FUNC, \
  62. __VA_ARGS__)
  63. #define msg_debug_session(...) rspamd_conditional_debug_fast(NULL, session->client_addr, \
  64. rspamd_proxy_log_id, "proxy", session->pool->tag.uid, \
  65. RSPAMD_LOG_FUNC, \
  66. __VA_ARGS__)
  67. INIT_LOG_MODULE(proxy)
  68. gpointer init_rspamd_proxy(struct rspamd_config *cfg);
  69. void start_rspamd_proxy(struct rspamd_worker *worker);
  70. worker_t rspamd_proxy_worker = {
  71. "rspamd_proxy", /* Name */
  72. init_rspamd_proxy, /* Init function */
  73. start_rspamd_proxy, /* Start function */
  74. RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE | RSPAMD_WORKER_SCANNER,
  75. RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */
  76. RSPAMD_WORKER_VER};
  77. struct rspamd_http_upstream {
  78. char *name;
  79. char *settings_id;
  80. struct upstream_list *u;
  81. struct rspamd_cryptobox_pubkey *key;
  82. double timeout;
  83. int parser_from_ref;
  84. int parser_to_ref;
  85. gboolean local;
  86. gboolean self_scan;
  87. gboolean compress;
  88. };
  89. struct rspamd_http_mirror {
  90. char *name;
  91. char *settings_id;
  92. struct upstream_list *u;
  93. struct rspamd_cryptobox_pubkey *key;
  94. double prob;
  95. double timeout;
  96. int parser_from_ref;
  97. int parser_to_ref;
  98. gboolean local;
  99. gboolean compress;
  100. };
  101. static const uint64_t rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL;
  102. struct rspamd_proxy_ctx {
  103. uint64_t magic;
  104. /* Events base */
  105. struct ev_loop *event_loop;
  106. /* DNS resolver */
  107. struct rspamd_dns_resolver *resolver;
  108. /* Config */
  109. struct rspamd_config *cfg;
  110. /* END OF COMMON PART */
  111. double timeout;
  112. /* Encryption key for clients */
  113. struct rspamd_cryptobox_keypair *key;
  114. /* HTTP context */
  115. struct rspamd_http_context *http_ctx;
  116. /* Upstreams to use */
  117. GHashTable *upstreams;
  118. /* Mirrors to send traffic to */
  119. GPtrArray *mirrors;
  120. /* Default upstream */
  121. struct rspamd_http_upstream *default_upstream;
  122. lua_State *lua_state;
  123. /* Array of callback functions called on end of scan to compare results */
  124. GArray *cmp_refs;
  125. /* Maximum count for retries */
  126. unsigned int max_retries;
  127. gboolean encrypted_only;
  128. /* If we have self_scanning backends, we need to work as a normal worker */
  129. gboolean has_self_scan;
  130. /* It is not HTTP but milter proxy */
  131. gboolean milter;
  132. /* Discard messages instead of rejecting them */
  133. gboolean discard_on_reject;
  134. /* Quarantine messages instead of rejecting them */
  135. gboolean quarantine_on_reject;
  136. /* Milter spam header */
  137. char *spam_header;
  138. /* CA name that can be used for client certificates */
  139. char *client_ca_name;
  140. /* Milter messages */
  141. char *reject_message;
  142. char *quarantine_message;
  143. char *tempfail_message;
  144. /* Sessions cache */
  145. void *sessions_cache;
  146. struct rspamd_milter_context milter_ctx;
  147. /* Language detector */
  148. struct rspamd_lang_detector *lang_det;
  149. double task_timeout;
  150. };
  151. enum rspamd_backend_flags {
  152. RSPAMD_BACKEND_REPLIED = 1 << 0,
  153. RSPAMD_BACKEND_CLOSED = 1 << 1,
  154. RSPAMD_BACKEND_PARSED = 1 << 2,
  155. };
  156. struct rspamd_proxy_session;
  157. struct rspamd_proxy_backend_connection {
  158. const char *name;
  159. struct rspamd_cryptobox_keypair *local_key;
  160. struct rspamd_cryptobox_pubkey *remote_key;
  161. struct upstream *up;
  162. struct rspamd_http_connection *backend_conn;
  163. ucl_object_t *results;
  164. const char *err;
  165. struct rspamd_proxy_session *s;
  166. int backend_sock;
  167. ev_tstamp timeout;
  168. enum rspamd_backend_flags flags;
  169. int parser_from_ref;
  170. int parser_to_ref;
  171. struct rspamd_task *task;
  172. };
  173. enum rspamd_proxy_legacy_support {
  174. LEGACY_SUPPORT_NO = 0,
  175. LEGACY_SUPPORT_RSPAMC,
  176. LEGACY_SUPPORT_SPAMC
  177. };
  178. struct rspamd_proxy_session {
  179. struct rspamd_worker *worker;
  180. rspamd_mempool_t *pool;
  181. struct rspamd_proxy_ctx *ctx;
  182. rspamd_inet_addr_t *client_addr;
  183. struct rspamd_http_connection *client_conn;
  184. struct rspamd_milter_session *client_milter_conn;
  185. struct rspamd_http_upstream *backend;
  186. gpointer map;
  187. char *fname;
  188. gpointer shmem_ref;
  189. struct rspamd_proxy_backend_connection *master_conn;
  190. struct rspamd_http_message *client_message;
  191. GPtrArray *mirror_conns;
  192. gsize map_len;
  193. int client_sock;
  194. enum rspamd_proxy_legacy_support legacy_support;
  195. int retries;
  196. ref_entry_t ref;
  197. };
  198. static gboolean proxy_send_master_message(struct rspamd_proxy_session *session);
  199. static GQuark
  200. rspamd_proxy_quark(void)
  201. {
  202. return g_quark_from_static_string("rspamd-proxy");
  203. }
  204. static gboolean
  205. rspamd_proxy_parse_lua_parser(lua_State *L, const ucl_object_t *obj,
  206. int *ref_from, int *ref_to, GError **err)
  207. {
  208. const char *lua_script;
  209. gsize slen;
  210. int err_idx, ref_idx;
  211. gboolean has_ref = FALSE;
  212. g_assert(obj != NULL);
  213. g_assert(ref_from != NULL);
  214. g_assert(ref_to != NULL);
  215. *ref_from = -1;
  216. *ref_to = -1;
  217. lua_script = ucl_object_tolstring(obj, &slen);
  218. lua_pushcfunction(L, &rspamd_lua_traceback);
  219. err_idx = lua_gettop(L);
  220. /* Load data */
  221. if (luaL_loadbuffer(L, lua_script, slen, "proxy parser") != 0) {
  222. g_set_error(err,
  223. rspamd_proxy_quark(),
  224. EINVAL,
  225. "cannot load lua parser script: %s",
  226. lua_tostring(L, -1));
  227. lua_settop(L, 0); /* Error function */
  228. return FALSE;
  229. }
  230. /* Now do it */
  231. if (lua_pcall(L, 0, 1, err_idx) != 0) {
  232. g_set_error(err,
  233. rspamd_proxy_quark(),
  234. EINVAL,
  235. "cannot init lua parser script: %s",
  236. lua_tostring(L, -1));
  237. lua_settop(L, 0);
  238. return FALSE;
  239. }
  240. if (lua_istable(L, -1)) {
  241. /*
  242. * We have a table, so we check for two keys:
  243. * 'from' -> function
  244. * 'to' -> function
  245. *
  246. * From converts parent request to a client one
  247. * To converts client request to a parent one
  248. */
  249. lua_pushstring(L, "from");
  250. lua_gettable(L, -2);
  251. if (lua_isfunction(L, -1)) {
  252. ref_idx = luaL_ref(L, LUA_REGISTRYINDEX);
  253. *ref_from = ref_idx;
  254. has_ref = TRUE;
  255. }
  256. lua_pushstring(L, "to");
  257. lua_gettable(L, -2);
  258. if (lua_isfunction(L, -1)) {
  259. ref_idx = luaL_ref(L, LUA_REGISTRYINDEX);
  260. *ref_to = ref_idx;
  261. has_ref = TRUE;
  262. }
  263. }
  264. else if (!lua_isfunction(L, -1)) {
  265. g_set_error(err,
  266. rspamd_proxy_quark(),
  267. EINVAL,
  268. "cannot init lua parser script: "
  269. "must return function");
  270. lua_settop(L, 0);
  271. return FALSE;
  272. }
  273. else {
  274. /* Just parser from protocol */
  275. ref_idx = luaL_ref(L, LUA_REGISTRYINDEX);
  276. *ref_from = ref_idx;
  277. lua_settop(L, 0);
  278. has_ref = TRUE;
  279. }
  280. return has_ref;
  281. }
  282. static gboolean
  283. rspamd_proxy_parse_upstream(rspamd_mempool_t *pool,
  284. const ucl_object_t *obj,
  285. gpointer ud,
  286. struct rspamd_rcl_section *section,
  287. GError **err)
  288. {
  289. const ucl_object_t *elt;
  290. struct rspamd_http_upstream *up = NULL;
  291. struct rspamd_proxy_ctx *ctx;
  292. struct rspamd_rcl_struct_parser *pd = ud;
  293. lua_State *L;
  294. ctx = pd->user_struct;
  295. L = ctx->lua_state;
  296. if (ucl_object_type(obj) != UCL_OBJECT) {
  297. if (ucl_object_type(obj) != UCL_NULL) {
  298. msg_info_pool_check("upstream %s is disabled by setting it to NULL",
  299. ucl_object_key(obj));
  300. return TRUE;
  301. }
  302. g_set_error(err, rspamd_proxy_quark(), 100,
  303. "upstream option must be an object");
  304. return FALSE;
  305. }
  306. if (!rspamd_config_is_enabled_from_ucl(pool, obj)) {
  307. /* Upstream is valid but disabled */
  308. msg_info_pool_check("upstream %s is disabled",
  309. ucl_object_lookup(obj, "name") ? ucl_object_tostring(ucl_object_lookup(obj, "name")) : ucl_object_key(obj));
  310. return TRUE;
  311. }
  312. up = rspamd_mempool_alloc0(pool, sizeof(*up));
  313. elt = ucl_object_lookup(obj, "name");
  314. if (elt == NULL) {
  315. if (ucl_object_key(obj)) {
  316. if (strcmp(ucl_object_key(obj), "upstream") == 0) {
  317. /* Iterate over the object and find upstream elements */
  318. ucl_object_iter_t it = NULL;
  319. const ucl_object_t *cur;
  320. gboolean ret = TRUE;
  321. while ((cur = ucl_object_iterate(obj, &it, true)) != NULL) {
  322. if (!rspamd_proxy_parse_upstream(pool, cur, ud,
  323. section, err)) {
  324. ret = FALSE;
  325. }
  326. }
  327. return ret;
  328. }
  329. else {
  330. /* Inside upstream */
  331. up->name = rspamd_mempool_strdup(pool, ucl_object_key(obj));
  332. }
  333. }
  334. else {
  335. g_set_error(err, rspamd_proxy_quark(), 100,
  336. "upstream option must have some name definition");
  337. return FALSE;
  338. }
  339. }
  340. else {
  341. up->name = rspamd_mempool_strdup(pool, ucl_object_tostring(elt));
  342. }
  343. up->parser_from_ref = -1;
  344. up->parser_to_ref = -1;
  345. up->timeout = ctx->timeout;
  346. elt = ucl_object_lookup(obj, "key");
  347. if (elt != NULL) {
  348. up->key = rspamd_pubkey_from_base32(ucl_object_tostring(elt), 0,
  349. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  350. if (up->key == NULL) {
  351. g_set_error(err, rspamd_proxy_quark(), 100,
  352. "cannot read upstream key");
  353. goto err;
  354. }
  355. rspamd_mempool_add_destructor(pool,
  356. (rspamd_mempool_destruct_t) rspamd_pubkey_unref, up->key);
  357. }
  358. elt = ucl_object_lookup(obj, "self_scan");
  359. if (elt && ucl_object_toboolean(elt)) {
  360. up->self_scan = TRUE;
  361. ctx->has_self_scan = TRUE;
  362. }
  363. elt = ucl_object_lookup_any(obj, "compress", "compression", NULL);
  364. if (elt && ucl_object_toboolean(elt)) {
  365. up->compress = TRUE;
  366. }
  367. elt = ucl_object_lookup(obj, "hosts");
  368. if (elt == NULL && !up->self_scan) {
  369. g_set_error(err, rspamd_proxy_quark(), 100,
  370. "upstream option must have some hosts definition");
  371. goto err;
  372. }
  373. if (elt) {
  374. up->u = rspamd_upstreams_create(ctx->cfg->ups_ctx);
  375. if (!rspamd_upstreams_from_ucl(up->u, elt, 11333, NULL)) {
  376. g_set_error(err, rspamd_proxy_quark(), 100,
  377. "upstream has bad hosts definition");
  378. goto err;
  379. }
  380. rspamd_mempool_add_destructor(pool,
  381. (rspamd_mempool_destruct_t) rspamd_upstreams_destroy, up->u);
  382. }
  383. elt = ucl_object_lookup(obj, "default");
  384. if (elt) {
  385. if (ucl_object_toboolean(elt)) {
  386. ctx->default_upstream = up;
  387. }
  388. }
  389. else if (up->self_scan) {
  390. ctx->default_upstream = up;
  391. }
  392. elt = ucl_object_lookup(obj, "local");
  393. if (elt && ucl_object_toboolean(elt)) {
  394. up->local = TRUE;
  395. }
  396. elt = ucl_object_lookup(obj, "timeout");
  397. if (elt) {
  398. ucl_object_todouble_safe(elt, &up->timeout);
  399. }
  400. elt = ucl_object_lookup_any(obj, "settings", "settings_id", NULL);
  401. if (elt && ucl_object_type(elt) == UCL_STRING) {
  402. up->settings_id = rspamd_mempool_strdup(pool, ucl_object_tostring(elt));
  403. }
  404. /*
  405. * Accept lua function here in form
  406. * fun :: String -> UCL
  407. */
  408. elt = ucl_object_lookup(obj, "parser");
  409. if (elt) {
  410. if (!rspamd_proxy_parse_lua_parser(L, elt, &up->parser_from_ref,
  411. &up->parser_to_ref, err)) {
  412. goto err;
  413. }
  414. rspamd_lua_add_ref_dtor(L, pool, up->parser_from_ref);
  415. rspamd_lua_add_ref_dtor(L, pool, up->parser_to_ref);
  416. }
  417. g_hash_table_insert(ctx->upstreams, up->name, up);
  418. return TRUE;
  419. err:
  420. return FALSE;
  421. }
  422. static gboolean
  423. rspamd_proxy_parse_mirror(rspamd_mempool_t *pool,
  424. const ucl_object_t *obj,
  425. gpointer ud,
  426. struct rspamd_rcl_section *section,
  427. GError **err)
  428. {
  429. const ucl_object_t *elt;
  430. struct rspamd_http_mirror *up = NULL;
  431. struct rspamd_proxy_ctx *ctx;
  432. struct rspamd_rcl_struct_parser *pd = ud;
  433. lua_State *L;
  434. ctx = pd->user_struct;
  435. L = ctx->lua_state;
  436. if (ucl_object_type(obj) != UCL_OBJECT) {
  437. if (ucl_object_type(obj) != UCL_NULL) {
  438. msg_info_pool_check("mirror %s is disabled by setting it to NULL",
  439. ucl_object_key(obj));
  440. return TRUE;
  441. }
  442. g_set_error(err, rspamd_proxy_quark(), 100,
  443. "mirror option must be an object");
  444. return FALSE;
  445. }
  446. if (!rspamd_config_is_enabled_from_ucl(pool, obj)) {
  447. /* Upstream is valid but disabled */
  448. msg_info_pool_check("mirror %s is disabled",
  449. ucl_object_lookup(obj, "name") ? ucl_object_tostring(ucl_object_lookup(obj, "name")) : ucl_object_key(obj));
  450. return TRUE;
  451. }
  452. up = rspamd_mempool_alloc0(pool, sizeof(*up));
  453. elt = ucl_object_lookup(obj, "name");
  454. if (elt == NULL) {
  455. if (ucl_object_key(obj)) {
  456. if (strcmp(ucl_object_key(obj), "mirror") == 0) {
  457. /* Iterate over the object and find upstream elements */
  458. ucl_object_iter_t it = NULL;
  459. const ucl_object_t *cur;
  460. gboolean ret = TRUE;
  461. while ((cur = ucl_object_iterate(obj, &it, true)) != NULL) {
  462. if (!rspamd_proxy_parse_mirror(pool, cur, ud,
  463. section, err)) {
  464. ret = FALSE;
  465. }
  466. }
  467. return ret;
  468. }
  469. else {
  470. /* Inside upstream */
  471. up->name = rspamd_mempool_strdup(pool, ucl_object_key(obj));
  472. }
  473. }
  474. else {
  475. g_set_error(err, rspamd_proxy_quark(), 100,
  476. "mirror option must have some name definition");
  477. return FALSE;
  478. }
  479. }
  480. else {
  481. up->name = rspamd_mempool_strdup(pool, ucl_object_tostring(elt));
  482. }
  483. up->parser_to_ref = -1;
  484. up->parser_from_ref = -1;
  485. up->timeout = ctx->timeout;
  486. elt = ucl_object_lookup(obj, "key");
  487. if (elt != NULL) {
  488. up->key = rspamd_pubkey_from_base32(ucl_object_tostring(elt), 0,
  489. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  490. if (up->key == NULL) {
  491. g_set_error(err, rspamd_proxy_quark(), 100,
  492. "cannot read mirror key");
  493. goto err;
  494. }
  495. rspamd_mempool_add_destructor(pool,
  496. (rspamd_mempool_destruct_t) rspamd_pubkey_unref, up->key);
  497. }
  498. elt = ucl_object_lookup(obj, "hosts");
  499. if (elt == NULL) {
  500. g_set_error(err, rspamd_proxy_quark(), 100,
  501. "mirror option must have some hosts definition");
  502. goto err;
  503. }
  504. up->u = rspamd_upstreams_create(ctx->cfg->ups_ctx);
  505. if (!rspamd_upstreams_from_ucl(up->u, elt, 11333, NULL)) {
  506. g_set_error(err, rspamd_proxy_quark(), 100,
  507. "mirror has bad hosts definition");
  508. goto err;
  509. }
  510. rspamd_mempool_add_destructor(pool,
  511. (rspamd_mempool_destruct_t) rspamd_upstreams_destroy, up->u);
  512. elt = ucl_object_lookup_any(obj, "probability", "prob", NULL);
  513. if (elt) {
  514. up->prob = ucl_object_todouble(elt);
  515. }
  516. else {
  517. up->prob = 1.0;
  518. }
  519. elt = ucl_object_lookup(obj, "local");
  520. if (elt && ucl_object_toboolean(elt)) {
  521. up->local = TRUE;
  522. }
  523. elt = ucl_object_lookup_any(obj, "compress", "compression", NULL);
  524. if (elt && ucl_object_toboolean(elt)) {
  525. up->compress = TRUE;
  526. }
  527. elt = ucl_object_lookup(obj, "timeout");
  528. if (elt) {
  529. ucl_object_todouble_safe(elt, &up->timeout);
  530. }
  531. /*
  532. * Accept lua function here in form
  533. * fun :: String -> UCL
  534. */
  535. elt = ucl_object_lookup(obj, "parser");
  536. if (elt) {
  537. if (!rspamd_proxy_parse_lua_parser(L, elt, &up->parser_from_ref,
  538. &up->parser_to_ref, err)) {
  539. goto err;
  540. }
  541. rspamd_lua_add_ref_dtor(L, pool, up->parser_from_ref);
  542. rspamd_lua_add_ref_dtor(L, pool, up->parser_to_ref);
  543. }
  544. elt = ucl_object_lookup_any(obj, "settings", "settings_id", NULL);
  545. if (elt && ucl_object_type(elt) == UCL_STRING) {
  546. up->settings_id = rspamd_mempool_strdup(pool, ucl_object_tostring(elt));
  547. }
  548. g_ptr_array_add(ctx->mirrors, up);
  549. return TRUE;
  550. err:
  551. return FALSE;
  552. }
  553. static gboolean
  554. rspamd_proxy_parse_script(rspamd_mempool_t *pool,
  555. const ucl_object_t *obj,
  556. gpointer ud,
  557. struct rspamd_rcl_section *section,
  558. GError **err)
  559. {
  560. struct rspamd_proxy_ctx *ctx;
  561. struct rspamd_rcl_struct_parser *pd = ud;
  562. lua_State *L;
  563. const char *lua_script;
  564. gsize slen;
  565. int err_idx, ref_idx;
  566. struct stat st;
  567. ctx = pd->user_struct;
  568. L = ctx->lua_state;
  569. if (ucl_object_type(obj) != UCL_STRING) {
  570. g_set_error(err, rspamd_proxy_quark(), 100,
  571. "script option must be a string with file or lua chunk");
  572. return FALSE;
  573. }
  574. lua_script = ucl_object_tolstring(obj, &slen);
  575. lua_pushcfunction(L, &rspamd_lua_traceback);
  576. err_idx = lua_gettop(L);
  577. if (stat(lua_script, &st) != -1) {
  578. /* Load file */
  579. if (luaL_loadfile(L, lua_script) != 0) {
  580. g_set_error(err,
  581. rspamd_proxy_quark(),
  582. EINVAL,
  583. "cannot load lua parser script: %s",
  584. lua_tostring(L, -1));
  585. lua_settop(L, 0); /* Error function */
  586. goto err;
  587. }
  588. }
  589. else {
  590. /* Load data directly */
  591. if (luaL_loadbuffer(L, lua_script, slen, "proxy parser") != 0) {
  592. g_set_error(err,
  593. rspamd_proxy_quark(),
  594. EINVAL,
  595. "cannot load lua parser script: %s",
  596. lua_tostring(L, -1));
  597. lua_settop(L, 0); /* Error function */
  598. goto err;
  599. }
  600. }
  601. /* Now do it */
  602. if (lua_pcall(L, 0, 1, err_idx) != 0) {
  603. g_set_error(err,
  604. rspamd_proxy_quark(),
  605. EINVAL,
  606. "cannot init lua parser script: %s",
  607. lua_tostring(L, -1));
  608. lua_settop(L, 0);
  609. goto err;
  610. }
  611. if (!lua_isfunction(L, -1)) {
  612. g_set_error(err,
  613. rspamd_proxy_quark(),
  614. EINVAL,
  615. "cannot init lua parser script: "
  616. "must return function, %s returned",
  617. lua_typename(L, lua_type(L, -1)));
  618. lua_settop(L, 0);
  619. goto err;
  620. }
  621. ref_idx = luaL_ref(L, LUA_REGISTRYINDEX);
  622. lua_settop(L, 0);
  623. g_array_append_val(ctx->cmp_refs, ref_idx);
  624. return TRUE;
  625. err:
  626. return FALSE;
  627. }
  628. gpointer
  629. init_rspamd_proxy(struct rspamd_config *cfg)
  630. {
  631. struct rspamd_proxy_ctx *ctx;
  632. GQuark type;
  633. type = g_quark_try_string("rspamd_proxy");
  634. ctx = rspamd_mempool_alloc0(cfg->cfg_pool,
  635. sizeof(struct rspamd_proxy_ctx));
  636. ctx->magic = rspamd_rspamd_proxy_magic;
  637. ctx->timeout = 120.0;
  638. ctx->upstreams = g_hash_table_new(rspamd_strcase_hash, rspamd_strcase_equal);
  639. rspamd_mempool_add_destructor(cfg->cfg_pool,
  640. (rspamd_mempool_destruct_t) g_hash_table_unref, ctx->upstreams);
  641. ctx->mirrors = g_ptr_array_new();
  642. rspamd_mempool_add_destructor(cfg->cfg_pool,
  643. (rspamd_mempool_destruct_t) rspamd_ptr_array_free_hard, ctx->mirrors);
  644. ctx->cfg = cfg;
  645. ctx->lua_state = cfg->lua_state;
  646. ctx->cmp_refs = g_array_new(FALSE, FALSE, sizeof(int));
  647. rspamd_mempool_add_destructor(cfg->cfg_pool,
  648. (rspamd_mempool_destruct_t) rspamd_array_free_hard, ctx->cmp_refs);
  649. ctx->max_retries = DEFAULT_RETRIES;
  650. ctx->spam_header = RSPAMD_MILTER_SPAM_HEADER;
  651. rspamd_rcl_register_worker_option(cfg,
  652. type,
  653. "timeout",
  654. rspamd_rcl_parse_struct_time,
  655. ctx,
  656. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, timeout),
  657. RSPAMD_CL_FLAG_TIME_FLOAT,
  658. "IO timeout");
  659. rspamd_rcl_register_worker_option(cfg,
  660. type,
  661. "keypair",
  662. rspamd_rcl_parse_struct_keypair,
  663. ctx,
  664. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, key),
  665. 0,
  666. "Server's keypair");
  667. rspamd_rcl_register_worker_option(cfg,
  668. type,
  669. "encrypted_only",
  670. rspamd_rcl_parse_struct_boolean,
  671. ctx,
  672. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, encrypted_only),
  673. 0,
  674. "Allow only encrypted connections");
  675. rspamd_rcl_register_worker_option(cfg,
  676. type,
  677. "upstream",
  678. rspamd_proxy_parse_upstream,
  679. ctx,
  680. 0,
  681. 0,
  682. "List of upstreams");
  683. rspamd_rcl_register_worker_option(cfg,
  684. type,
  685. "mirror",
  686. rspamd_proxy_parse_mirror,
  687. ctx,
  688. 0,
  689. RSPAMD_CL_FLAG_MULTIPLE,
  690. "List of mirrors");
  691. rspamd_rcl_register_worker_option(cfg,
  692. type,
  693. "script",
  694. rspamd_proxy_parse_script,
  695. ctx,
  696. 0,
  697. RSPAMD_CL_FLAG_MULTIPLE,
  698. "Compare script to be executed");
  699. rspamd_rcl_register_worker_option(cfg,
  700. type,
  701. "max_retries",
  702. rspamd_rcl_parse_struct_integer,
  703. ctx,
  704. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, max_retries),
  705. RSPAMD_CL_FLAG_UINT,
  706. "Maximum number of retries for master connection");
  707. rspamd_rcl_register_worker_option(cfg,
  708. type,
  709. "milter",
  710. rspamd_rcl_parse_struct_boolean,
  711. ctx,
  712. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, milter),
  713. 0,
  714. "Accept milter connections, not HTTP");
  715. rspamd_rcl_register_worker_option(cfg,
  716. type,
  717. "discard_on_reject",
  718. rspamd_rcl_parse_struct_boolean,
  719. ctx,
  720. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, discard_on_reject),
  721. 0,
  722. "Tell MTA to discard rejected messages silently");
  723. rspamd_rcl_register_worker_option(cfg,
  724. type,
  725. "quarantine_on_reject",
  726. rspamd_rcl_parse_struct_boolean,
  727. ctx,
  728. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, quarantine_on_reject),
  729. 0,
  730. "Tell MTA to quarantine rejected messages");
  731. rspamd_rcl_register_worker_option(cfg,
  732. type,
  733. "spam_header",
  734. rspamd_rcl_parse_struct_string,
  735. ctx,
  736. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, spam_header),
  737. 0,
  738. "Use the specific spam header (default: X-Spam)");
  739. rspamd_rcl_register_worker_option(cfg,
  740. type,
  741. "client_ca_name",
  742. rspamd_rcl_parse_struct_string,
  743. ctx,
  744. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, client_ca_name),
  745. 0,
  746. "Allow certificates issued by this CA to be treated as client certificates");
  747. rspamd_rcl_register_worker_option(cfg,
  748. type,
  749. "reject_message",
  750. rspamd_rcl_parse_struct_string,
  751. ctx,
  752. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, reject_message),
  753. 0,
  754. "Use custom rejection message");
  755. rspamd_rcl_register_worker_option(cfg,
  756. type,
  757. "quarantine_message",
  758. rspamd_rcl_parse_struct_string,
  759. ctx,
  760. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, quarantine_message),
  761. 0,
  762. "Use custom quarantine message");
  763. rspamd_rcl_register_worker_option(cfg,
  764. type,
  765. "tempfail_message",
  766. rspamd_rcl_parse_struct_string,
  767. ctx,
  768. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, tempfail_message),
  769. 0,
  770. "Use custom tempfail message");
  771. return ctx;
  772. }
  773. static void
  774. proxy_backend_close_connection(struct rspamd_proxy_backend_connection *conn)
  775. {
  776. if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  777. if (conn->backend_conn) {
  778. rspamd_http_connection_reset(conn->backend_conn);
  779. rspamd_http_connection_unref(conn->backend_conn);
  780. close(conn->backend_sock);
  781. }
  782. conn->flags |= RSPAMD_BACKEND_CLOSED;
  783. }
  784. }
  785. static gboolean
  786. proxy_backend_parse_results(struct rspamd_proxy_session *session,
  787. struct rspamd_proxy_backend_connection *conn,
  788. lua_State *L, int parser_ref,
  789. struct rspamd_http_message *msg,
  790. goffset *body_offset,
  791. const rspamd_ftok_t *ct)
  792. {
  793. struct ucl_parser *parser;
  794. int err_idx;
  795. const char *in = msg->body_buf.begin;
  796. gsize inlen = msg->body_buf.len;
  797. const rspamd_ftok_t *offset_hdr;
  798. if (inlen == 0 || in == NULL) {
  799. return FALSE;
  800. }
  801. offset_hdr = rspamd_http_message_find_header(msg, MESSAGE_OFFSET_HEADER);
  802. if (offset_hdr) {
  803. gulong val;
  804. if (rspamd_strtoul(offset_hdr->begin, offset_hdr->len, &val) && val < inlen) {
  805. if (body_offset) {
  806. *body_offset = val;
  807. }
  808. inlen = val;
  809. }
  810. }
  811. if (parser_ref != -1) {
  812. /* Call parser function */
  813. lua_pushcfunction(L, &rspamd_lua_traceback);
  814. err_idx = lua_gettop(L);
  815. lua_rawgeti(L, LUA_REGISTRYINDEX, parser_ref);
  816. /* XXX: copies all data */
  817. lua_pushlstring(L, in, inlen);
  818. if (lua_pcall(L, 1, 1, err_idx) != 0) {
  819. msg_err_session(
  820. "cannot run lua parser script: %s",
  821. lua_tostring(L, -1));
  822. lua_settop(L, 0);
  823. return FALSE;
  824. }
  825. conn->results = ucl_object_lua_import(L, -1);
  826. lua_settop(L, 0);
  827. }
  828. else {
  829. rspamd_ftok_t json_ct;
  830. RSPAMD_FTOK_ASSIGN(&json_ct, "application/json");
  831. if (ct && rspamd_ftok_casecmp(ct, &json_ct) == 0) {
  832. parser = ucl_parser_new(0);
  833. if (!ucl_parser_add_chunk(parser, in, inlen)) {
  834. char *encoded;
  835. encoded = rspamd_encode_base64(in, inlen, 0, NULL);
  836. msg_err_session("cannot parse input: %s", ucl_parser_get_error(
  837. parser));
  838. msg_err_session("input encoded: %s", encoded);
  839. ucl_parser_free(parser);
  840. g_free(encoded);
  841. return FALSE;
  842. }
  843. conn->results = ucl_parser_get_object(parser);
  844. ucl_parser_free(parser);
  845. }
  846. }
  847. return TRUE;
  848. }
  849. static void
  850. proxy_call_cmp_script(struct rspamd_proxy_session *session, int cbref)
  851. {
  852. int err_idx;
  853. unsigned int i;
  854. struct rspamd_proxy_backend_connection *conn;
  855. lua_State *L;
  856. L = session->ctx->lua_state;
  857. lua_pushcfunction(L, &rspamd_lua_traceback);
  858. err_idx = lua_gettop(L);
  859. lua_rawgeti(L, LUA_REGISTRYINDEX, cbref);
  860. lua_createtable(L, 0, session->mirror_conns->len + 1);
  861. /* Now push master results */
  862. if (session->master_conn && session->master_conn->results) {
  863. lua_pushstring(L, "master");
  864. ucl_object_push_lua(L, session->master_conn->results, true);
  865. lua_settable(L, -3);
  866. }
  867. else {
  868. lua_pushstring(L, "master");
  869. lua_pushstring(L, "no results");
  870. lua_settable(L, -3);
  871. }
  872. for (i = 0; i < session->mirror_conns->len; i++) {
  873. conn = g_ptr_array_index(session->mirror_conns, i);
  874. if (conn->results) {
  875. lua_pushstring(L, conn->name);
  876. ucl_object_push_lua(L, conn->results, true);
  877. lua_settable(L, -3);
  878. }
  879. else {
  880. lua_pushstring(L, conn->name);
  881. lua_pushstring(L, conn->err ? conn->err : "unknown error");
  882. lua_settable(L, -3);
  883. }
  884. }
  885. char log_tag[RSPAMD_LOG_ID_LEN + 1];
  886. rspamd_strlcpy(log_tag, session->pool->tag.uid, sizeof(log_tag));
  887. lua_pushstring(L, log_tag);
  888. if (lua_pcall(L, 2, 0, err_idx) != 0) {
  889. msg_err_session(
  890. "cannot run lua compare script: %s",
  891. lua_tostring(L, -1));
  892. }
  893. lua_settop(L, err_idx - 1);
  894. }
  895. static void
  896. proxy_session_dtor(struct rspamd_proxy_session *session)
  897. {
  898. unsigned int i;
  899. int cbref;
  900. struct rspamd_proxy_backend_connection *conn;
  901. if (session->master_conn && session->master_conn->results) {
  902. for (i = 0; i < session->ctx->cmp_refs->len; i++) {
  903. cbref = g_array_index(session->ctx->cmp_refs, int, i);
  904. proxy_call_cmp_script(session, cbref);
  905. }
  906. }
  907. if (session->master_conn) {
  908. proxy_backend_close_connection(session->master_conn);
  909. }
  910. if (session->client_milter_conn) {
  911. rspamd_milter_session_unref(session->client_milter_conn);
  912. }
  913. else if (session->client_conn) {
  914. rspamd_http_connection_reset(session->client_conn);
  915. rspamd_http_connection_unref(session->client_conn);
  916. }
  917. if (session->map && session->map_len) {
  918. munmap(session->map, session->map_len);
  919. }
  920. for (i = 0; i < session->mirror_conns->len; i++) {
  921. conn = g_ptr_array_index(session->mirror_conns, i);
  922. if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  923. proxy_backend_close_connection(conn);
  924. }
  925. if (conn->results) {
  926. ucl_object_unref(conn->results);
  927. }
  928. }
  929. if (session->master_conn) {
  930. if (session->master_conn->results) {
  931. ucl_object_unref(session->master_conn->results);
  932. }
  933. if (session->master_conn->task) {
  934. rspamd_session_destroy(session->master_conn->task->s);
  935. }
  936. }
  937. g_ptr_array_free(session->mirror_conns, TRUE);
  938. rspamd_http_message_shmem_unref(session->shmem_ref);
  939. rspamd_http_message_unref(session->client_message);
  940. if (session->client_addr) {
  941. rspamd_inet_address_free(session->client_addr);
  942. }
  943. if (session->client_sock != -1) {
  944. close(session->client_sock);
  945. }
  946. if (session->ctx->sessions_cache) {
  947. rspamd_worker_session_cache_remove(session->ctx->sessions_cache,
  948. session);
  949. }
  950. if (session->pool) {
  951. rspamd_mempool_delete(session->pool);
  952. }
  953. session->worker->nconns--;
  954. g_free(session);
  955. }
  956. static void
  957. proxy_request_compress(struct rspamd_http_message *msg)
  958. {
  959. unsigned int flags;
  960. ZSTD_CCtx *zctx;
  961. rspamd_fstring_t *body;
  962. const char *in;
  963. gsize inlen;
  964. flags = rspamd_http_message_get_flags(msg);
  965. if (!rspamd_http_message_find_header(msg, COMPRESSION_HEADER)) {
  966. if ((flags & RSPAMD_HTTP_FLAG_SHMEM) ||
  967. !(flags & RSPAMD_HTTP_FLAG_HAS_BODY)) {
  968. /* Cannot compress shared or empty message */
  969. return;
  970. }
  971. in = rspamd_http_message_get_body(msg, &inlen);
  972. if (in == NULL || inlen == 0) {
  973. return;
  974. }
  975. body = rspamd_fstring_sized_new(ZSTD_compressBound(inlen));
  976. zctx = ZSTD_createCCtx();
  977. body->len = ZSTD_compressCCtx(zctx, body->str, body->allocated,
  978. in, inlen, 1);
  979. if (ZSTD_isError(body->len)) {
  980. msg_err("compression error");
  981. rspamd_fstring_free(body);
  982. ZSTD_freeCCtx(zctx);
  983. return;
  984. }
  985. ZSTD_freeCCtx(zctx);
  986. rspamd_http_message_set_body_from_fstring_steal(msg, body);
  987. rspamd_http_message_add_header(msg, COMPRESSION_HEADER, "zstd");
  988. }
  989. }
  990. static void
  991. proxy_request_decompress(struct rspamd_http_message *msg)
  992. {
  993. rspamd_fstring_t *body;
  994. const char *in;
  995. gsize inlen, outlen, r;
  996. ZSTD_DStream *zstream;
  997. ZSTD_inBuffer zin;
  998. ZSTD_outBuffer zout;
  999. if (rspamd_http_message_find_header(msg, COMPRESSION_HEADER)) {
  1000. in = rspamd_http_message_get_body(msg, &inlen);
  1001. if (in == NULL || inlen == 0) {
  1002. return;
  1003. }
  1004. zstream = ZSTD_createDStream();
  1005. ZSTD_initDStream(zstream);
  1006. zin.pos = 0;
  1007. zin.src = in;
  1008. zin.size = inlen;
  1009. if ((outlen = ZSTD_getDecompressedSize(zin.src, zin.size)) == 0) {
  1010. outlen = ZSTD_DStreamOutSize();
  1011. }
  1012. body = rspamd_fstring_sized_new(outlen);
  1013. zout.dst = body->str;
  1014. zout.pos = 0;
  1015. zout.size = outlen;
  1016. while (zin.pos < zin.size) {
  1017. r = ZSTD_decompressStream(zstream, &zout, &zin);
  1018. if (ZSTD_isError(r)) {
  1019. msg_err("Decompression error: %s", ZSTD_getErrorName(r));
  1020. ZSTD_freeDStream(zstream);
  1021. rspamd_fstring_free(body);
  1022. return;
  1023. }
  1024. if (zout.pos == zout.size) {
  1025. /* We need to extend output buffer */
  1026. zout.size = zout.size * 2 + 1;
  1027. body = rspamd_fstring_grow(body, zout.size);
  1028. zout.size = body->allocated;
  1029. zout.dst = body->str;
  1030. }
  1031. }
  1032. body->len = zout.pos;
  1033. ZSTD_freeDStream(zstream);
  1034. rspamd_http_message_set_body_from_fstring_steal(msg, body);
  1035. rspamd_http_message_remove_header(msg, COMPRESSION_HEADER);
  1036. }
  1037. }
  1038. static struct rspamd_proxy_session *
  1039. proxy_session_refresh(struct rspamd_proxy_session *session)
  1040. {
  1041. struct rspamd_proxy_session *nsession;
  1042. nsession = g_malloc0(sizeof(*nsession));
  1043. nsession->client_milter_conn = session->client_milter_conn;
  1044. session->client_milter_conn = NULL;
  1045. rspamd_milter_update_userdata(nsession->client_milter_conn,
  1046. nsession);
  1047. nsession->client_addr = session->client_addr;
  1048. session->client_addr = NULL;
  1049. nsession->ctx = session->ctx;
  1050. nsession->worker = session->worker;
  1051. nsession->pool = rspamd_mempool_new(rspamd_mempool_suggest_size(), "proxy", 0);
  1052. nsession->client_sock = session->client_sock;
  1053. session->client_sock = -1;
  1054. nsession->mirror_conns = g_ptr_array_sized_new(nsession->ctx->mirrors->len);
  1055. REF_INIT_RETAIN(nsession, proxy_session_dtor);
  1056. if (nsession->ctx->sessions_cache) {
  1057. rspamd_worker_session_cache_add(nsession->ctx->sessions_cache,
  1058. nsession->pool->tag.uid, &nsession->ref.refcount, nsession);
  1059. }
  1060. return nsession;
  1061. }
  1062. static gboolean
  1063. proxy_check_file(struct rspamd_http_message *msg,
  1064. struct rspamd_proxy_session *session)
  1065. {
  1066. const rspamd_ftok_t *tok, *key_tok;
  1067. rspamd_ftok_t srch;
  1068. char *file_str;
  1069. GHashTable *query_args;
  1070. GHashTableIter it;
  1071. gpointer k, v;
  1072. struct http_parser_url u;
  1073. rspamd_fstring_t *new_url;
  1074. tok = rspamd_http_message_find_header(msg, "File");
  1075. if (tok) {
  1076. file_str = rspamd_mempool_ftokdup(session->pool, tok);
  1077. session->map = rspamd_file_xmap(file_str, PROT_READ, &session->map_len,
  1078. TRUE);
  1079. if (session->map == NULL) {
  1080. if (session->map_len != 0) {
  1081. msg_err_session("cannot map %s: %s", file_str,
  1082. strerror(errno));
  1083. return FALSE;
  1084. }
  1085. }
  1086. /* Remove header after processing */
  1087. rspamd_http_message_remove_header(msg, "File");
  1088. session->fname = file_str;
  1089. }
  1090. else {
  1091. /* Need to parse query URL */
  1092. if (http_parser_parse_url(RSPAMD_FSTRING_DATA(msg->url),
  1093. RSPAMD_FSTRING_LEN(msg->url), 0, &u) != 0) {
  1094. msg_err_session("bad request url: %V", msg->url);
  1095. return FALSE;
  1096. }
  1097. if (u.field_set & (1 << UF_QUERY)) {
  1098. /* In case if we have a query, we need to store it somewhere */
  1099. query_args = rspamd_http_message_parse_query(msg);
  1100. srch.begin = "File";
  1101. srch.len = strlen("File");
  1102. tok = g_hash_table_lookup(query_args, &srch);
  1103. if (tok) {
  1104. file_str = rspamd_mempool_ftokdup(session->pool, tok);
  1105. session->map = rspamd_file_xmap(file_str, PROT_READ,
  1106. &session->map_len, TRUE);
  1107. if (session->map == NULL) {
  1108. if (session->map_len != 0) {
  1109. msg_err_session("cannot map %s: %s", file_str,
  1110. strerror(errno));
  1111. g_hash_table_unref(query_args);
  1112. return FALSE;
  1113. }
  1114. }
  1115. /* We need to create a new URL with file attribute removed */
  1116. new_url = rspamd_fstring_new_init(RSPAMD_FSTRING_DATA(msg->url),
  1117. u.field_data[UF_QUERY].off);
  1118. new_url = rspamd_fstring_append(new_url, "?", 1);
  1119. g_hash_table_iter_init(&it, query_args);
  1120. while (g_hash_table_iter_next(&it, &k, &v)) {
  1121. key_tok = k;
  1122. tok = v;
  1123. if (!rspamd_ftok_icase_equal(key_tok, &srch)) {
  1124. rspamd_printf_fstring(&new_url, "%T=%T&",
  1125. key_tok, tok);
  1126. }
  1127. }
  1128. /* Erase last character (might be either & or ?) */
  1129. rspamd_fstring_erase(new_url, new_url->len - 1, 1);
  1130. rspamd_fstring_free(msg->url);
  1131. msg->url = new_url;
  1132. session->fname = file_str;
  1133. }
  1134. g_hash_table_unref(query_args);
  1135. }
  1136. }
  1137. return TRUE;
  1138. }
  1139. static void
  1140. proxy_backend_mirror_error_handler(struct rspamd_http_connection *conn, GError *err)
  1141. {
  1142. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1143. struct rspamd_proxy_session *session;
  1144. session = bk_conn->s;
  1145. msg_info_session("abnormally closing connection from backend: %s:%s, "
  1146. "error: %e",
  1147. bk_conn->name,
  1148. rspamd_inet_address_to_string_pretty(
  1149. rspamd_upstream_addr_cur(bk_conn->up)),
  1150. err);
  1151. if (err) {
  1152. bk_conn->err = rspamd_mempool_strdup(session->pool, err->message);
  1153. }
  1154. rspamd_upstream_fail(bk_conn->up, FALSE, err ? err->message : "unknown");
  1155. proxy_backend_close_connection(bk_conn);
  1156. REF_RELEASE(bk_conn->s);
  1157. }
  1158. static int
  1159. proxy_backend_mirror_finish_handler(struct rspamd_http_connection *conn,
  1160. struct rspamd_http_message *msg)
  1161. {
  1162. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1163. struct rspamd_proxy_session *session;
  1164. const rspamd_ftok_t *orig_ct;
  1165. session = bk_conn->s;
  1166. proxy_request_decompress(msg);
  1167. orig_ct = rspamd_http_message_find_header(msg, "Content-Type");
  1168. if (!proxy_backend_parse_results(session, bk_conn, session->ctx->lua_state,
  1169. bk_conn->parser_from_ref, msg, NULL, orig_ct)) {
  1170. msg_warn_session("cannot parse results from the mirror backend %s:%s",
  1171. bk_conn->name,
  1172. rspamd_inet_address_to_string(
  1173. rspamd_upstream_addr_cur(bk_conn->up)));
  1174. bk_conn->err = "cannot parse ucl";
  1175. }
  1176. msg_info_session("finished mirror connection to %s", bk_conn->name);
  1177. rspamd_upstream_ok(bk_conn->up);
  1178. proxy_backend_close_connection(bk_conn);
  1179. REF_RELEASE(bk_conn->s);
  1180. return 0;
  1181. }
  1182. static void
  1183. proxy_open_mirror_connections(struct rspamd_proxy_session *session)
  1184. {
  1185. double coin;
  1186. struct rspamd_http_mirror *m;
  1187. unsigned int i;
  1188. struct rspamd_proxy_backend_connection *bk_conn;
  1189. struct rspamd_http_message *msg;
  1190. GError *err = NULL;
  1191. coin = rspamd_random_double();
  1192. for (i = 0; i < session->ctx->mirrors->len; i++) {
  1193. m = g_ptr_array_index(session->ctx->mirrors, i);
  1194. if (m->prob < coin) {
  1195. /* No luck */
  1196. continue;
  1197. }
  1198. bk_conn = rspamd_mempool_alloc0(session->pool,
  1199. sizeof(*bk_conn));
  1200. bk_conn->s = session;
  1201. bk_conn->name = m->name;
  1202. bk_conn->timeout = m->timeout;
  1203. bk_conn->up = rspamd_upstream_get(m->u,
  1204. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1205. bk_conn->parser_from_ref = m->parser_from_ref;
  1206. bk_conn->parser_to_ref = m->parser_to_ref;
  1207. if (bk_conn->up == NULL) {
  1208. msg_err_session("cannot select upstream for %s", m->name);
  1209. continue;
  1210. }
  1211. bk_conn->backend_sock = rspamd_inet_address_connect(
  1212. rspamd_upstream_addr_next(bk_conn->up),
  1213. SOCK_STREAM, TRUE);
  1214. if (bk_conn->backend_sock == -1) {
  1215. msg_err_session("cannot connect upstream for %s", m->name);
  1216. rspamd_upstream_fail(bk_conn->up, TRUE, strerror(errno));
  1217. continue;
  1218. }
  1219. msg = rspamd_http_connection_copy_msg(session->client_message, &err);
  1220. if (msg == NULL) {
  1221. msg_err_session("cannot copy message to send to a mirror %s: %e",
  1222. m->name, err);
  1223. if (err) {
  1224. g_error_free(err);
  1225. }
  1226. continue;
  1227. }
  1228. const char *up_name = rspamd_upstream_name(bk_conn->up);
  1229. if (up_name) {
  1230. rspamd_http_message_remove_header(msg, "Host");
  1231. rspamd_http_message_add_header(msg, "Host", up_name);
  1232. }
  1233. rspamd_http_message_add_header(msg, "Connection", "close");
  1234. if (msg->url->len == 0) {
  1235. msg->url = rspamd_fstring_append(msg->url, "/check", strlen("/check"));
  1236. }
  1237. if (m->settings_id != NULL) {
  1238. rspamd_http_message_remove_header(msg, "Settings-ID");
  1239. rspamd_http_message_add_header(msg, "Settings-ID", m->settings_id);
  1240. }
  1241. bk_conn->backend_conn = rspamd_http_connection_new_client_socket(
  1242. session->ctx->http_ctx,
  1243. NULL,
  1244. proxy_backend_mirror_error_handler,
  1245. proxy_backend_mirror_finish_handler,
  1246. RSPAMD_HTTP_CLIENT_SIMPLE,
  1247. bk_conn->backend_sock);
  1248. if (m->key) {
  1249. msg->peer_key = rspamd_pubkey_ref(m->key);
  1250. }
  1251. if (m->local ||
  1252. rspamd_inet_address_is_local(rspamd_upstream_addr_cur(bk_conn->up))) {
  1253. if (session->fname) {
  1254. rspamd_http_message_add_header(msg, "File", session->fname);
  1255. }
  1256. msg->method = HTTP_GET;
  1257. rspamd_http_connection_write_message_shared(bk_conn->backend_conn,
  1258. msg, rspamd_upstream_name(bk_conn->up), NULL, bk_conn,
  1259. bk_conn->timeout);
  1260. }
  1261. else {
  1262. if (session->fname) {
  1263. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1264. rspamd_http_message_set_body(msg, session->map, session->map_len);
  1265. }
  1266. msg->method = HTTP_POST;
  1267. if (m->compress) {
  1268. proxy_request_compress(msg);
  1269. if (session->client_milter_conn) {
  1270. rspamd_http_message_add_header(msg, "Content-Type",
  1271. "application/octet-stream");
  1272. }
  1273. }
  1274. else {
  1275. if (session->client_milter_conn) {
  1276. rspamd_http_message_add_header(msg, "Content-Type",
  1277. "text/plain");
  1278. }
  1279. }
  1280. rspamd_http_connection_write_message(bk_conn->backend_conn,
  1281. msg, rspamd_upstream_name(bk_conn->up), NULL, bk_conn,
  1282. bk_conn->timeout);
  1283. }
  1284. g_ptr_array_add(session->mirror_conns, bk_conn);
  1285. REF_RETAIN(session);
  1286. msg_info_session("send request to %s", m->name);
  1287. }
  1288. }
  1289. static void
  1290. proxy_client_write_error(struct rspamd_proxy_session *session, int code,
  1291. const char *status)
  1292. {
  1293. struct rspamd_http_message *reply;
  1294. if (session->client_milter_conn) {
  1295. rspamd_milter_send_action(session->client_milter_conn,
  1296. RSPAMD_MILTER_TEMPFAIL);
  1297. REF_RELEASE(session);
  1298. }
  1299. else {
  1300. reply = rspamd_http_new_message(HTTP_RESPONSE);
  1301. switch (code) {
  1302. case ETIMEDOUT:
  1303. reply->code = 504;
  1304. reply->status = RSPAMD_FSTRING_LIT("Gateway timeout");
  1305. break;
  1306. case ECONNRESET:
  1307. case ECONNABORTED:
  1308. reply->code = 502;
  1309. reply->status = RSPAMD_FSTRING_LIT("Gateway connection reset");
  1310. break;
  1311. case ECONNREFUSED:
  1312. reply->code = 502;
  1313. reply->status = RSPAMD_FSTRING_LIT("Gateway connection refused");
  1314. break;
  1315. default:
  1316. if (code >= 300) {
  1317. /* Likely HTTP error */
  1318. reply->code = code;
  1319. reply->status = rspamd_fstring_new_init(status, strlen(status));
  1320. }
  1321. else {
  1322. reply->code = 502;
  1323. reply->status = RSPAMD_FSTRING_LIT("Unknown gateway error: ");
  1324. reply->status = rspamd_fstring_append(reply->status,
  1325. status, strlen(status));
  1326. }
  1327. break;
  1328. }
  1329. rspamd_http_connection_write_message(session->client_conn,
  1330. reply, NULL, NULL, session,
  1331. session->ctx->timeout);
  1332. }
  1333. }
  1334. static void
  1335. proxy_backend_master_error_handler(struct rspamd_http_connection *conn, GError *err)
  1336. {
  1337. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1338. struct rspamd_proxy_session *session;
  1339. session = bk_conn->s;
  1340. session->retries++;
  1341. msg_info_session("abnormally closing connection from backend: %s, error: %e,"
  1342. " retries left: %d",
  1343. rspamd_inet_address_to_string_pretty(
  1344. rspamd_upstream_addr_cur(session->master_conn->up)),
  1345. err,
  1346. session->ctx->max_retries - session->retries);
  1347. rspamd_upstream_fail(bk_conn->up, FALSE, err ? err->message : "unknown");
  1348. proxy_backend_close_connection(session->master_conn);
  1349. if (session->ctx->max_retries > 0 &&
  1350. session->retries >= session->ctx->max_retries) {
  1351. msg_err_session("cannot connect to upstream, maximum retries "
  1352. "has been reached: %d",
  1353. session->retries);
  1354. /* Terminate session immediately */
  1355. if (err) {
  1356. proxy_client_write_error(session, err->code, err->message);
  1357. }
  1358. else {
  1359. proxy_client_write_error(session, 503, "Unknown error after no retries left");
  1360. }
  1361. }
  1362. else {
  1363. if (!proxy_send_master_message(session)) {
  1364. if (err) {
  1365. proxy_client_write_error(session, err->code, err->message);
  1366. }
  1367. else {
  1368. proxy_client_write_error(session, 503, "Unknown error on write");
  1369. }
  1370. }
  1371. else {
  1372. msg_info_session("retry connection to: %s"
  1373. " retries left: %d",
  1374. rspamd_inet_address_to_string(
  1375. rspamd_upstream_addr_cur(session->master_conn->up)),
  1376. session->ctx->max_retries - session->retries);
  1377. }
  1378. }
  1379. }
  1380. static int
  1381. proxy_backend_master_finish_handler(struct rspamd_http_connection *conn,
  1382. struct rspamd_http_message *msg)
  1383. {
  1384. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1385. struct rspamd_proxy_session *session, *nsession;
  1386. rspamd_fstring_t *reply;
  1387. const rspamd_ftok_t *orig_ct;
  1388. goffset body_offset = -1;
  1389. session = bk_conn->s;
  1390. rspamd_http_connection_steal_msg(session->master_conn->backend_conn);
  1391. proxy_request_decompress(msg);
  1392. /*
  1393. * These are likely set by an http library, so we will double these headers
  1394. * if they are not removed
  1395. */
  1396. rspamd_http_message_remove_header(msg, "Content-Length");
  1397. rspamd_http_message_remove_header(msg, "Connection");
  1398. rspamd_http_message_remove_header(msg, "Date");
  1399. rspamd_http_message_remove_header(msg, "Server");
  1400. rspamd_http_message_remove_header(msg, "Key");
  1401. orig_ct = rspamd_http_message_find_header(msg, "Content-Type");
  1402. rspamd_http_connection_reset(session->master_conn->backend_conn);
  1403. if (!proxy_backend_parse_results(session, bk_conn, session->ctx->lua_state,
  1404. bk_conn->parser_from_ref, msg, &body_offset, orig_ct)) {
  1405. msg_warn_session("cannot parse results from the master backend");
  1406. }
  1407. if (session->legacy_support > LEGACY_SUPPORT_NO) {
  1408. /* We need to reformat ucl to fit with legacy spamc protocol */
  1409. if (bk_conn->results) {
  1410. reply = rspamd_fstring_new();
  1411. if (session->legacy_support == LEGACY_SUPPORT_SPAMC) {
  1412. rspamd_ucl_tospamc_output(bk_conn->results, &reply);
  1413. msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
  1414. }
  1415. else {
  1416. rspamd_ucl_torspamc_output(bk_conn->results, &reply);
  1417. }
  1418. rspamd_http_message_set_body_from_fstring_steal(msg, reply);
  1419. msg->method = HTTP_SYMBOLS;
  1420. }
  1421. else {
  1422. msg_warn_session("cannot parse results from the master backend, "
  1423. "return them as is");
  1424. }
  1425. }
  1426. rspamd_upstream_ok(bk_conn->up);
  1427. if (session->client_milter_conn) {
  1428. nsession = proxy_session_refresh(session);
  1429. if (body_offset > 0) {
  1430. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1431. session->master_conn->results,
  1432. msg->body_buf.begin + body_offset,
  1433. msg->body_buf.len - body_offset);
  1434. }
  1435. else {
  1436. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1437. session->master_conn->results, NULL, 0);
  1438. }
  1439. REF_RELEASE(session);
  1440. rspamd_http_message_free(msg);
  1441. }
  1442. else {
  1443. const char *passed_ct = NULL;
  1444. if (orig_ct) {
  1445. passed_ct = rspamd_mempool_ftokdup(session->pool, orig_ct);
  1446. /* Remove original */
  1447. rspamd_http_message_remove_header(msg, "Content-Type");
  1448. }
  1449. rspamd_http_connection_write_message(session->client_conn,
  1450. msg, NULL, passed_ct, session,
  1451. bk_conn->timeout);
  1452. }
  1453. return 0;
  1454. }
  1455. static void
  1456. rspamd_proxy_scan_self_reply(struct rspamd_task *task)
  1457. {
  1458. struct rspamd_http_message *msg;
  1459. struct rspamd_proxy_session *session = task->fin_arg, *nsession;
  1460. ucl_object_t *rep = NULL;
  1461. int out_type = UCL_EMIT_JSON_COMPACT;
  1462. const char *ctype = "application/json";
  1463. const rspamd_ftok_t *accept_hdr = rspamd_task_get_request_header(task, "Accept");
  1464. if (accept_hdr && rspamd_substring_search(accept_hdr->begin, accept_hdr->len,
  1465. "application/msgpack", sizeof("application/msgpack") - 1) != -1) {
  1466. ctype = "application/msgpack";
  1467. out_type = UCL_EMIT_MSGPACK;
  1468. }
  1469. msg = rspamd_http_new_message(HTTP_RESPONSE);
  1470. msg->date = time(NULL);
  1471. msg->code = 200;
  1472. switch (task->cmd) {
  1473. case CMD_CHECK:
  1474. case CMD_SKIP:
  1475. case CMD_CHECK_RSPAMC:
  1476. case CMD_CHECK_SPAMC:
  1477. case CMD_CHECK_V2:
  1478. rspamd_task_set_finish_time(task);
  1479. rspamd_protocol_http_reply(msg, task, &rep, out_type);
  1480. rspamd_protocol_write_log_pipe(task);
  1481. break;
  1482. case CMD_PING:
  1483. rspamd_http_message_set_body(msg, "pong" CRLF, 6);
  1484. ctype = "text/plain";
  1485. break;
  1486. default:
  1487. msg_err_task("BROKEN");
  1488. break;
  1489. }
  1490. session->master_conn->flags |= RSPAMD_BACKEND_CLOSED;
  1491. if (rep) {
  1492. session->master_conn->results = ucl_object_ref(rep);
  1493. }
  1494. if (session->client_milter_conn) {
  1495. nsession = proxy_session_refresh(session);
  1496. if (task->flags & RSPAMD_TASK_FLAG_MESSAGE_REWRITE) {
  1497. const char *start;
  1498. goffset len, hdr_off;
  1499. start = task->msg.begin;
  1500. len = task->msg.len;
  1501. hdr_off = MESSAGE_FIELD(task, raw_headers_content).len;
  1502. if (hdr_off < len) {
  1503. start += hdr_off;
  1504. len -= hdr_off;
  1505. /* The problem here is that we need not end of headers, we need
  1506. * start of body.
  1507. *
  1508. * Hence, we need to skip one \r\n till there is anything else in
  1509. * a line.
  1510. */
  1511. if (*start == '\r' && len > 0) {
  1512. start++;
  1513. len--;
  1514. }
  1515. if (*start == '\n' && len > 0) {
  1516. start++;
  1517. len--;
  1518. }
  1519. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1520. session->master_conn->results, start, len);
  1521. }
  1522. else {
  1523. /* XXX: should never happen! */
  1524. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1525. session->master_conn->results, NULL, 0);
  1526. }
  1527. }
  1528. else {
  1529. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1530. session->master_conn->results, NULL, 0);
  1531. }
  1532. rspamd_http_message_free(msg);
  1533. REF_RELEASE(session);
  1534. }
  1535. else {
  1536. rspamd_http_connection_reset(session->client_conn);
  1537. rspamd_http_connection_write_message(session->client_conn,
  1538. msg,
  1539. NULL,
  1540. ctype,
  1541. session,
  1542. session->ctx->timeout / 10.0);
  1543. }
  1544. }
  1545. static gboolean
  1546. rspamd_proxy_task_fin(void *ud)
  1547. {
  1548. struct rspamd_task *task = ud;
  1549. msg_debug_task("finish task");
  1550. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  1551. rspamd_proxy_scan_self_reply(task);
  1552. return TRUE;
  1553. }
  1554. if (!rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL)) {
  1555. rspamd_proxy_scan_self_reply(task);
  1556. return TRUE;
  1557. }
  1558. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  1559. rspamd_proxy_scan_self_reply(task);
  1560. return TRUE;
  1561. }
  1562. /* One more iteration */
  1563. return FALSE;
  1564. }
  1565. static gboolean
  1566. rspamd_proxy_self_scan(struct rspamd_proxy_session *session)
  1567. {
  1568. struct rspamd_task *task;
  1569. struct rspamd_http_message *msg;
  1570. const char *data;
  1571. gsize len;
  1572. msg = session->client_message;
  1573. task = rspamd_task_new(session->worker, session->ctx->cfg,
  1574. session->pool, session->ctx->lang_det,
  1575. session->ctx->event_loop, FALSE);
  1576. task->flags |= RSPAMD_TASK_FLAG_MIME;
  1577. if (session->ctx->milter) {
  1578. task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_MILTER |
  1579. RSPAMD_TASK_PROTOCOL_FLAG_BODY_BLOCK;
  1580. }
  1581. task->sock = -1;
  1582. if (session->client_milter_conn) {
  1583. task->client_addr = rspamd_inet_address_copy(
  1584. session->client_milter_conn->addr, NULL);
  1585. }
  1586. else {
  1587. task->client_addr = rspamd_inet_address_copy(session->client_addr, NULL);
  1588. }
  1589. task->fin_arg = session;
  1590. task->resolver = session->ctx->resolver;
  1591. /* TODO: allow to disable autolearn in protocol */
  1592. task->flags |= RSPAMD_TASK_FLAG_LEARN_AUTO;
  1593. task->s = rspamd_session_create(task->task_pool, rspamd_proxy_task_fin,
  1594. NULL, (event_finalizer_t) rspamd_task_free, task);
  1595. data = rspamd_http_message_get_body(msg, &len);
  1596. if (session->backend->settings_id) {
  1597. rspamd_http_message_remove_header(msg, "Settings-ID");
  1598. rspamd_http_message_add_header(msg, "Settings-ID",
  1599. session->backend->settings_id);
  1600. }
  1601. /* Process message */
  1602. if (!rspamd_protocol_handle_request(task, msg)) {
  1603. msg_err_task("cannot handle request: %e", task->err);
  1604. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1605. }
  1606. else {
  1607. if (task->cmd == CMD_PING) {
  1608. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1609. }
  1610. else {
  1611. if (!rspamd_task_load_message(task, msg, data, len)) {
  1612. msg_err_task("cannot load message: %e", task->err);
  1613. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1614. }
  1615. }
  1616. }
  1617. /* Set global timeout for the task */
  1618. if (session->ctx->default_upstream->timeout > 0.0) {
  1619. task->timeout_ev.data = task;
  1620. ev_timer_init(&task->timeout_ev, rspamd_task_timeout,
  1621. session->ctx->default_upstream->timeout,
  1622. session->ctx->default_upstream->timeout);
  1623. ev_timer_start(task->event_loop, &task->timeout_ev);
  1624. }
  1625. else if (session->ctx->has_self_scan) {
  1626. if (!isnan(session->ctx->task_timeout) && session->ctx->task_timeout > 0) {
  1627. task->timeout_ev.data = task;
  1628. ev_timer_init(&task->timeout_ev, rspamd_task_timeout,
  1629. session->ctx->cfg->task_timeout,
  1630. session->ctx->default_upstream->timeout);
  1631. ev_timer_start(task->event_loop, &task->timeout_ev);
  1632. }
  1633. }
  1634. session->master_conn->task = task;
  1635. rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL);
  1636. rspamd_session_pending(task->s);
  1637. return TRUE;
  1638. }
  1639. static gboolean
  1640. proxy_send_master_message(struct rspamd_proxy_session *session)
  1641. {
  1642. struct rspamd_http_message *msg;
  1643. struct rspamd_http_upstream *backend = NULL;
  1644. const rspamd_ftok_t *host;
  1645. GError *err = NULL;
  1646. char hostbuf[512];
  1647. host = rspamd_http_message_find_header(session->client_message, "Host");
  1648. if (host == NULL) {
  1649. backend = session->ctx->default_upstream;
  1650. }
  1651. else {
  1652. rspamd_strlcpy(hostbuf, host->begin, MIN(host->len + 1, sizeof(hostbuf)));
  1653. backend = g_hash_table_lookup(session->ctx->upstreams, hostbuf);
  1654. if (backend == NULL) {
  1655. backend = session->ctx->default_upstream;
  1656. }
  1657. /* Remove the original Host header */
  1658. rspamd_http_message_remove_header(session->client_message, "Host");
  1659. }
  1660. /* Remove the original `Connection` header */
  1661. rspamd_http_message_remove_header(session->client_message, "Connection");
  1662. if (backend == NULL) {
  1663. /* No backend */
  1664. msg_err_session("cannot find upstream for %s", host ? hostbuf : "default");
  1665. goto err;
  1666. }
  1667. else {
  1668. session->backend = backend;
  1669. if (backend->self_scan) {
  1670. return rspamd_proxy_self_scan(session);
  1671. }
  1672. retry:
  1673. if (session->ctx->max_retries &&
  1674. session->retries > session->ctx->max_retries) {
  1675. msg_err_session("cannot connect to upstream, maximum retries "
  1676. "has been reached: %d",
  1677. session->retries);
  1678. goto err;
  1679. }
  1680. /* Provide hash key if hashing based on source address is desired */
  1681. unsigned int hash_len;
  1682. gpointer hash_key = rspamd_inet_address_get_hash_key(session->client_addr,
  1683. &hash_len);
  1684. if (session->ctx->max_retries > 1 &&
  1685. session->retries == session->ctx->max_retries) {
  1686. session->master_conn->up = rspamd_upstream_get_except(backend->u,
  1687. session->master_conn->up,
  1688. RSPAMD_UPSTREAM_ROUND_ROBIN,
  1689. hash_key, hash_len);
  1690. }
  1691. else {
  1692. session->master_conn->up = rspamd_upstream_get(backend->u,
  1693. RSPAMD_UPSTREAM_ROUND_ROBIN,
  1694. hash_key, hash_len);
  1695. }
  1696. session->master_conn->timeout = backend->timeout;
  1697. if (session->master_conn->up == NULL) {
  1698. msg_err_session("cannot select upstream for %s",
  1699. host ? hostbuf : "default");
  1700. goto err;
  1701. }
  1702. session->master_conn->backend_sock = rspamd_inet_address_connect(
  1703. rspamd_upstream_addr_next(session->master_conn->up),
  1704. SOCK_STREAM, TRUE);
  1705. if (session->master_conn->backend_sock == -1) {
  1706. msg_err_session("cannot connect upstream: %s(%s)",
  1707. host ? hostbuf : "default",
  1708. rspamd_inet_address_to_string_pretty(
  1709. rspamd_upstream_addr_cur(
  1710. session->master_conn->up)));
  1711. rspamd_upstream_fail(session->master_conn->up, TRUE,
  1712. strerror(errno));
  1713. session->retries++;
  1714. goto retry;
  1715. }
  1716. msg = rspamd_http_connection_copy_msg(session->client_message, &err);
  1717. if (msg == NULL) {
  1718. msg_err_session("cannot copy message to send it to the upstream: %e",
  1719. err);
  1720. if (err) {
  1721. g_error_free(err);
  1722. }
  1723. goto err; /* No fallback here */
  1724. }
  1725. /* Add new Host header */
  1726. const char *up_name = rspamd_upstream_name(session->master_conn->up);
  1727. if (up_name) {
  1728. rspamd_http_message_add_header(msg, "Host", up_name);
  1729. }
  1730. rspamd_http_message_add_header(msg, "Connection", "close");
  1731. session->master_conn->backend_conn = rspamd_http_connection_new_client_socket(
  1732. session->ctx->http_ctx,
  1733. NULL,
  1734. proxy_backend_master_error_handler,
  1735. proxy_backend_master_finish_handler,
  1736. RSPAMD_HTTP_CLIENT_SIMPLE,
  1737. session->master_conn->backend_sock);
  1738. session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED;
  1739. session->master_conn->parser_from_ref = backend->parser_from_ref;
  1740. session->master_conn->parser_to_ref = backend->parser_to_ref;
  1741. if (backend->key) {
  1742. msg->peer_key = rspamd_pubkey_ref(backend->key);
  1743. }
  1744. if (backend->settings_id != NULL) {
  1745. rspamd_http_message_remove_header(msg, "Settings-ID");
  1746. rspamd_http_message_add_header(msg, "Settings-ID",
  1747. backend->settings_id);
  1748. }
  1749. if (backend->local ||
  1750. rspamd_inet_address_is_local(
  1751. rspamd_upstream_addr_cur(
  1752. session->master_conn->up))) {
  1753. if (session->fname) {
  1754. rspamd_http_message_add_header(msg, "File", session->fname);
  1755. }
  1756. msg->method = HTTP_GET;
  1757. rspamd_http_connection_write_message_shared(
  1758. session->master_conn->backend_conn,
  1759. msg, rspamd_upstream_name(session->master_conn->up),
  1760. NULL, session->master_conn,
  1761. session->master_conn->timeout);
  1762. }
  1763. else {
  1764. if (session->fname) {
  1765. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1766. rspamd_http_message_set_body(msg,
  1767. session->map, session->map_len);
  1768. }
  1769. msg->method = HTTP_POST;
  1770. if (backend->compress) {
  1771. proxy_request_compress(msg);
  1772. if (session->client_milter_conn) {
  1773. rspamd_http_message_add_header(msg, "Content-Type",
  1774. "application/octet-stream");
  1775. }
  1776. }
  1777. else {
  1778. if (session->client_milter_conn) {
  1779. rspamd_http_message_add_header(msg, "Content-Type",
  1780. "text/plain");
  1781. }
  1782. }
  1783. rspamd_http_connection_write_message(
  1784. session->master_conn->backend_conn,
  1785. msg, rspamd_upstream_name(session->master_conn->up),
  1786. NULL, session->master_conn,
  1787. session->master_conn->timeout);
  1788. }
  1789. }
  1790. return TRUE;
  1791. err:
  1792. if (session->client_milter_conn) {
  1793. rspamd_milter_send_action(session->client_milter_conn,
  1794. RSPAMD_MILTER_TEMPFAIL);
  1795. REF_RELEASE(session);
  1796. }
  1797. else {
  1798. rspamd_http_connection_steal_msg(session->client_conn);
  1799. rspamd_http_connection_reset(session->client_conn);
  1800. proxy_client_write_error(session, 404, "Backend not found");
  1801. }
  1802. return FALSE;
  1803. }
  1804. static void
  1805. proxy_client_error_handler(struct rspamd_http_connection *conn, GError *err)
  1806. {
  1807. struct rspamd_proxy_session *session = conn->ud;
  1808. msg_info_session("abnormally closing connection from: %s, error: %s",
  1809. rspamd_inet_address_to_string(session->client_addr), err->message);
  1810. /* Terminate session immediately */
  1811. proxy_backend_close_connection(session->master_conn);
  1812. REF_RELEASE(session);
  1813. }
  1814. static int
  1815. proxy_client_finish_handler(struct rspamd_http_connection *conn,
  1816. struct rspamd_http_message *msg)
  1817. {
  1818. struct rspamd_proxy_session *session = conn->ud;
  1819. if (!session->master_conn) {
  1820. session->master_conn = rspamd_mempool_alloc0(session->pool,
  1821. sizeof(*session->master_conn));
  1822. session->master_conn->s = session;
  1823. session->master_conn->name = "master";
  1824. /* Reset spamc legacy */
  1825. if (msg->method >= HTTP_SYMBOLS) {
  1826. msg->method = HTTP_POST;
  1827. if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) {
  1828. session->legacy_support = LEGACY_SUPPORT_SPAMC;
  1829. msg_info_session("enabling legacy spamc mode for session");
  1830. }
  1831. else {
  1832. session->legacy_support = LEGACY_SUPPORT_RSPAMC;
  1833. msg_info_session("enabling legacy rspamc mode for session");
  1834. }
  1835. }
  1836. if (msg->url->len == 0) {
  1837. msg->url = rspamd_fstring_append(msg->url,
  1838. "/" MSG_CMD_CHECK_V2, strlen("/" MSG_CMD_CHECK_V2));
  1839. }
  1840. if (!proxy_check_file(msg, session)) {
  1841. goto err;
  1842. }
  1843. session->client_message = rspamd_http_connection_steal_msg(
  1844. session->client_conn);
  1845. session->shmem_ref = rspamd_http_message_shmem_ref(session->client_message);
  1846. rspamd_http_message_remove_header(msg, "Content-Length");
  1847. rspamd_http_message_remove_header(msg, "Transfer-Encoding");
  1848. rspamd_http_message_remove_header(msg, "Keep-Alive");
  1849. rspamd_http_message_remove_header(msg, "Connection");
  1850. rspamd_http_message_remove_header(msg, "Key");
  1851. proxy_open_mirror_connections(session);
  1852. rspamd_http_connection_reset(session->client_conn);
  1853. proxy_send_master_message(session);
  1854. }
  1855. else {
  1856. msg_info_session("finished master connection");
  1857. proxy_backend_close_connection(session->master_conn);
  1858. REF_RELEASE(session);
  1859. }
  1860. return 0;
  1861. err:
  1862. rspamd_http_connection_steal_msg(session->client_conn);
  1863. rspamd_http_message_remove_header(msg, "Content-Length");
  1864. rspamd_http_message_remove_header(msg, "Key");
  1865. rspamd_http_message_remove_header(msg, "Transfer-Encoding");
  1866. rspamd_http_message_remove_header(msg, "Keep-Alive");
  1867. rspamd_http_message_remove_header(msg, "Connection");
  1868. rspamd_http_connection_reset(session->client_conn);
  1869. proxy_client_write_error(session, 404, "Backend not found");
  1870. return 0;
  1871. }
  1872. static void
  1873. proxy_milter_finish_handler(int fd,
  1874. struct rspamd_milter_session *rms,
  1875. void *ud)
  1876. {
  1877. struct rspamd_proxy_session *session = ud;
  1878. struct rspamd_http_message *msg;
  1879. session->client_milter_conn = rms;
  1880. if (rms->message == NULL || rms->message->len == 0) {
  1881. msg_info_session("finished milter connection");
  1882. proxy_backend_close_connection(session->master_conn);
  1883. REF_RELEASE(session);
  1884. }
  1885. else {
  1886. if (!session->master_conn) {
  1887. session->master_conn = rspamd_mempool_alloc0(session->pool,
  1888. sizeof(*session->master_conn));
  1889. }
  1890. msg = rspamd_milter_to_http(rms);
  1891. session->master_conn->s = session;
  1892. session->master_conn->name = "master";
  1893. session->client_message = msg;
  1894. proxy_open_mirror_connections(session);
  1895. proxy_send_master_message(session);
  1896. }
  1897. }
  1898. static void
  1899. proxy_milter_error_handler(int fd,
  1900. struct rspamd_milter_session *rms, /* unused */
  1901. void *ud, GError *err)
  1902. {
  1903. struct rspamd_proxy_session *session = ud;
  1904. if (err && err->code != 0) {
  1905. msg_info_session("abnormally closing milter connection from: %s, "
  1906. "error: %e",
  1907. rspamd_inet_address_to_string_pretty(session->client_addr),
  1908. err);
  1909. /* Terminate session immediately */
  1910. proxy_backend_close_connection(session->master_conn);
  1911. REF_RELEASE(session);
  1912. }
  1913. else {
  1914. msg_info_session("normally closing milter connection from: %s, "
  1915. "%e",
  1916. rspamd_inet_address_to_string_pretty(session->client_addr),
  1917. err);
  1918. /* Terminate session immediately */
  1919. proxy_backend_close_connection(session->master_conn);
  1920. REF_RELEASE(session);
  1921. }
  1922. }
  1923. static void
  1924. proxy_accept_socket(EV_P_ ev_io *w, int revents)
  1925. {
  1926. struct rspamd_worker *worker = (struct rspamd_worker *) w->data;
  1927. struct rspamd_proxy_ctx *ctx;
  1928. rspamd_inet_addr_t *addr = NULL;
  1929. struct rspamd_proxy_session *session;
  1930. int nfd;
  1931. ctx = worker->ctx;
  1932. if ((nfd =
  1933. rspamd_accept_from_socket(w->fd, &addr,
  1934. rspamd_worker_throttle_accept_events, worker->accept_events)) == -1) {
  1935. msg_warn("accept failed: %s", strerror(errno));
  1936. return;
  1937. }
  1938. /* Check for EAGAIN */
  1939. if (nfd == 0) {
  1940. rspamd_inet_address_free(addr);
  1941. return;
  1942. }
  1943. worker->nconns++;
  1944. session = g_malloc0(sizeof(*session));
  1945. REF_INIT_RETAIN(session, proxy_session_dtor);
  1946. session->client_sock = nfd;
  1947. session->client_addr = addr;
  1948. session->mirror_conns = g_ptr_array_sized_new(ctx->mirrors->len);
  1949. session->pool = rspamd_mempool_new(rspamd_mempool_suggest_size(),
  1950. "proxy", 0);
  1951. session->ctx = ctx;
  1952. session->worker = worker;
  1953. if (ctx->sessions_cache) {
  1954. rspamd_worker_session_cache_add(ctx->sessions_cache,
  1955. session->pool->tag.uid, &session->ref.refcount, session);
  1956. }
  1957. if (!ctx->milter) {
  1958. int http_opts = 0;
  1959. if (ctx->encrypted_only && !rspamd_inet_address_is_local(addr)) {
  1960. http_opts |= RSPAMD_HTTP_REQUIRE_ENCRYPTION;
  1961. }
  1962. session->client_conn = rspamd_http_connection_new_server(
  1963. ctx->http_ctx,
  1964. nfd,
  1965. NULL,
  1966. proxy_client_error_handler,
  1967. proxy_client_finish_handler,
  1968. http_opts);
  1969. if (ctx->key) {
  1970. rspamd_http_connection_set_key(session->client_conn, ctx->key);
  1971. }
  1972. msg_info_session("accepted http connection from %s port %d",
  1973. rspamd_inet_address_to_string(addr),
  1974. rspamd_inet_address_get_port(addr));
  1975. rspamd_http_connection_read_message_shared(session->client_conn,
  1976. session,
  1977. session->ctx->timeout);
  1978. }
  1979. else {
  1980. msg_info_session("accepted milter connection from %s port %d",
  1981. rspamd_inet_address_to_string(addr),
  1982. rspamd_inet_address_get_port(addr));
  1983. #ifdef TCP_NODELAY
  1984. #ifndef SOL_TCP
  1985. #define SOL_TCP IPPROTO_TCP
  1986. #endif
  1987. if (rspamd_inet_address_get_af(addr) != AF_UNIX) {
  1988. int sopt = 1;
  1989. if (setsockopt(nfd, SOL_TCP, TCP_NODELAY, &sopt, sizeof(sopt)) ==
  1990. -1) {
  1991. msg_warn_session("cannot set TCP_NODELAY: %s",
  1992. strerror(errno));
  1993. }
  1994. }
  1995. #endif
  1996. rspamd_milter_handle_socket(nfd, 0.0,
  1997. session->pool,
  1998. ctx->event_loop,
  1999. proxy_milter_finish_handler,
  2000. proxy_milter_error_handler,
  2001. session);
  2002. }
  2003. }
  2004. static void
  2005. adjust_upstreams_limits(struct rspamd_proxy_ctx *ctx)
  2006. {
  2007. struct rspamd_http_upstream *backend;
  2008. gpointer k, v;
  2009. GHashTableIter it;
  2010. /*
  2011. * We set error time equal to max_retries * backend_timeout and max_errors
  2012. * to max_retries - 1
  2013. *
  2014. * So if we failed to scan a message on a backend for some reasons, we
  2015. * will try to re-resolve it faster
  2016. */
  2017. g_hash_table_iter_init(&it, ctx->upstreams);
  2018. while (g_hash_table_iter_next(&it, &k, &v)) {
  2019. backend = (struct rspamd_http_upstream *) v;
  2020. if (!backend->self_scan && backend->u) {
  2021. rspamd_upstreams_set_limits(backend->u,
  2022. NAN, NAN, ctx->max_retries * backend->timeout, NAN,
  2023. ctx->max_retries - 1, 0);
  2024. }
  2025. }
  2026. }
  2027. __attribute__((noreturn)) void
  2028. start_rspamd_proxy(struct rspamd_worker *worker)
  2029. {
  2030. struct rspamd_proxy_ctx *ctx = worker->ctx;
  2031. gboolean is_controller = FALSE;
  2032. g_assert(rspamd_worker_check_context(worker->ctx, rspamd_rspamd_proxy_magic));
  2033. ctx->cfg = worker->srv->cfg;
  2034. ctx->event_loop = rspamd_prepare_worker(worker, "rspamd_proxy",
  2035. proxy_accept_socket);
  2036. ctx->resolver = rspamd_dns_resolver_init(worker->srv->logger,
  2037. ctx->event_loop,
  2038. worker->srv->cfg);
  2039. rspamd_upstreams_library_config(worker->srv->cfg, ctx->cfg->ups_ctx,
  2040. ctx->event_loop, ctx->resolver->r);
  2041. ctx->http_ctx = rspamd_http_context_create(ctx->cfg, ctx->event_loop,
  2042. ctx->cfg->ups_ctx);
  2043. rspamd_mempool_add_destructor(ctx->cfg->cfg_pool,
  2044. (rspamd_mempool_destruct_t) rspamd_http_context_free,
  2045. ctx->http_ctx);
  2046. if (ctx->has_self_scan) {
  2047. /* Additional initialisation needed */
  2048. rspamd_worker_init_scanner(worker, ctx->event_loop, ctx->resolver,
  2049. &ctx->lang_det);
  2050. ctx->task_timeout = rspamd_worker_check_and_adjust_timeout(ctx->cfg, NAN);
  2051. is_controller = rspamd_worker_check_controller_presence(worker);
  2052. }
  2053. else {
  2054. worker->flags &= ~RSPAMD_WORKER_SCANNER;
  2055. }
  2056. if (worker->srv->cfg->enable_sessions_cache) {
  2057. ctx->sessions_cache = rspamd_worker_session_cache_new(worker,
  2058. ctx->event_loop);
  2059. }
  2060. ctx->milter_ctx.spam_header = ctx->spam_header;
  2061. ctx->milter_ctx.discard_on_reject = ctx->discard_on_reject;
  2062. ctx->milter_ctx.quarantine_on_reject = ctx->quarantine_on_reject;
  2063. ctx->milter_ctx.sessions_cache = ctx->sessions_cache;
  2064. ctx->milter_ctx.client_ca_name = ctx->client_ca_name;
  2065. ctx->milter_ctx.reject_message = ctx->reject_message;
  2066. ctx->milter_ctx.quarantine_message = ctx->quarantine_message;
  2067. ctx->milter_ctx.tempfail_message = ctx->tempfail_message;
  2068. ctx->milter_ctx.cfg = ctx->cfg;
  2069. rspamd_milter_init_library(&ctx->milter_ctx);
  2070. if (is_controller) {
  2071. rspamd_worker_init_controller(worker, NULL);
  2072. }
  2073. else {
  2074. if (ctx->has_self_scan) {
  2075. rspamd_map_watch(worker->srv->cfg, ctx->event_loop, ctx->resolver,
  2076. worker, RSPAMD_MAP_WATCH_SCANNER);
  2077. }
  2078. else {
  2079. rspamd_map_watch(worker->srv->cfg, ctx->event_loop, ctx->resolver,
  2080. worker, RSPAMD_MAP_WATCH_WORKER);
  2081. }
  2082. }
  2083. rspamd_lua_run_postloads(ctx->cfg->lua_state, ctx->cfg, ctx->event_loop,
  2084. worker);
  2085. adjust_upstreams_limits(ctx);
  2086. ev_loop(ctx->event_loop, 0);
  2087. rspamd_worker_block_signals();
  2088. if (ctx->has_self_scan) {
  2089. rspamd_stat_close();
  2090. }
  2091. if (is_controller) {
  2092. rspamd_controller_on_terminate(worker, NULL);
  2093. }
  2094. REF_RELEASE(ctx->cfg);
  2095. rspamd_log_close(worker->srv->logger);
  2096. rspamd_unset_crash_handler(worker->srv);
  2097. exit(EXIT_SUCCESS);
  2098. }