You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd.c 29KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126
  1. /*
  2. * Copyright (c) 2009-2012, Vsevolod Stakhov
  3. * All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions are met:
  7. * * Redistributions of source code must retain the above copyright
  8. * notice, this list of conditions and the following disclaimer.
  9. * * Redistributions in binary form must reproduce the above copyright
  10. * notice, this list of conditions and the following disclaimer in the
  11. * documentation and/or other materials provided with the distribution.
  12. *
  13. * THIS SOFTWARE IS PROVIDED BY AUTHOR ''AS IS'' AND ANY
  14. * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  15. * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  16. * DISCLAIMED. IN NO EVENT SHALL AUTHOR BE LIABLE FOR ANY
  17. * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
  18. * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  19. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
  20. * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  21. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  22. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  23. */
  24. #include "config.h"
  25. #include "rspamd.h"
  26. #include "libutil/map.h"
  27. #include "fuzzy_storage.h"
  28. #include "lua/lua_common.h"
  29. #include "libserver/worker_util.h"
  30. #include "libserver/rspamd_control.h"
  31. #include "ottery.h"
  32. #include "xxhash.h"
  33. #include "utlist.h"
  34. #include "unix-std.h"
  35. /* sysexits */
  36. #ifdef HAVE_SYSEXITS_H
  37. #include <sysexits.h>
  38. #endif
  39. /* pwd and grp */
  40. #ifdef HAVE_PWD_H
  41. #include <pwd.h>
  42. #endif
  43. #ifdef HAVE_GRP_H
  44. #include <grp.h>
  45. #endif
  46. #include <signal.h>
  47. #ifdef HAVE_SYS_WAIT_H
  48. #include <sys/wait.h>
  49. #endif
  50. #ifdef HAVE_LIBUTIL_H
  51. #include <libutil.h>
  52. #endif
  53. #ifdef WITH_GPERF_TOOLS
  54. #include <google/profiler.h>
  55. #endif
  56. #ifdef HAVE_STROPS_H
  57. #include <stropts.h>
  58. #endif
  59. #ifdef HAVE_OPENSSL
  60. #include <openssl/err.h>
  61. #include <openssl/evp.h>
  62. #endif
  63. /* 2 seconds to fork new process in place of dead one */
  64. #define SOFT_FORK_TIME 2
  65. /* 10 seconds after getting termination signal to terminate all workers with SIGKILL */
  66. #define TERMINATION_ATTEMPTS 50
  67. static gboolean load_rspamd_config (struct rspamd_main *rspamd_main,
  68. struct rspamd_config *cfg,
  69. gboolean init_modules);
  70. /* Control socket */
  71. static gint control_fd;
  72. /* Cmdline options */
  73. static gboolean config_test = FALSE;
  74. static gboolean no_fork = FALSE;
  75. static gchar **cfg_names = NULL;
  76. static gchar **lua_tests = NULL;
  77. static gchar **sign_configs = NULL;
  78. static gchar *privkey = NULL;
  79. static gchar *rspamd_user = NULL;
  80. static gchar *rspamd_group = NULL;
  81. static gchar *rspamd_pidfile = NULL;
  82. static gboolean dump_cache = FALSE;
  83. static gboolean is_debug = FALSE;
  84. static gboolean is_insecure = FALSE;
  85. static gboolean gen_keypair = FALSE;
  86. static gboolean encrypt_password = FALSE;
  87. static GHashTable *ucl_vars = NULL;
  88. static guint term_attempts = 0;
  89. /* List of unrelated forked processes */
  90. static GArray *other_workers = NULL;
  91. /* List of active listen sockets indexed by worker type */
  92. static GHashTable *listen_sockets = NULL;
  93. /* Defined in modules.c */
  94. extern module_t *modules[];
  95. extern worker_t *workers[];
  96. /* Commandline options */
  97. static GOptionEntry entries[] =
  98. {
  99. { "config-test", 't', 0, G_OPTION_ARG_NONE, &config_test,
  100. "Do config test and exit", NULL },
  101. { "no-fork", 'f', 0, G_OPTION_ARG_NONE, &no_fork,
  102. "Do not daemonize main process", NULL },
  103. { "config", 'c', 0, G_OPTION_ARG_FILENAME_ARRAY, &cfg_names,
  104. "Specify config file(s)", NULL },
  105. { "user", 'u', 0, G_OPTION_ARG_STRING, &rspamd_user,
  106. "User to run rspamd as", NULL },
  107. { "group", 'g', 0, G_OPTION_ARG_STRING, &rspamd_group,
  108. "Group to run rspamd as", NULL },
  109. { "pid", 'p', 0, G_OPTION_ARG_STRING, &rspamd_pidfile, "Path to pidfile",
  110. NULL },
  111. { "dump-cache", 'C', 0, G_OPTION_ARG_NONE, &dump_cache,
  112. "Dump symbols cache stats and exit", NULL },
  113. { "debug", 'd', 0, G_OPTION_ARG_NONE, &is_debug, "Force debug output",
  114. NULL },
  115. { "insecure", 'i', 0, G_OPTION_ARG_NONE, &is_insecure,
  116. "Ignore running workers as privileged users (insecure)", NULL },
  117. { "test-lua", 0, 0, G_OPTION_ARG_FILENAME_ARRAY, &lua_tests,
  118. "Specify lua file(s) to test", NULL },
  119. { "sign-config", 0, 0, G_OPTION_ARG_FILENAME_ARRAY, &sign_configs,
  120. "Specify config file(s) to sign", NULL },
  121. { "private-key", 0, 0, G_OPTION_ARG_FILENAME, &privkey,
  122. "Specify private key to sign", NULL },
  123. { "gen-keypair", 0, 0, G_OPTION_ARG_NONE, &gen_keypair, "Generate new encryption "
  124. "keypair", NULL},
  125. { "encrypt-password", 0, 0, G_OPTION_ARG_NONE, &encrypt_password, "Encrypt "
  126. "controller password to store in the configuration file", NULL },
  127. { NULL, 0, 0, G_OPTION_ARG_NONE, NULL, NULL, NULL }
  128. };
  129. static void
  130. read_cmd_line (gint *argc, gchar ***argv, struct rspamd_config *cfg)
  131. {
  132. GError *error = NULL;
  133. GOptionContext *context;
  134. guint i, cfg_num;
  135. pid_t r;
  136. context = g_option_context_new ("- run rspamd daemon");
  137. g_option_context_set_summary (context,
  138. "Summary:\n Rspamd daemon version " RVERSION "\n Release id: " RID);
  139. g_option_context_add_main_entries (context, entries, NULL);
  140. if (!g_option_context_parse (context, argc, argv, &error)) {
  141. fprintf (stderr, "option parsing failed: %s\n", error->message);
  142. exit (1);
  143. }
  144. cfg->no_fork = no_fork;
  145. cfg->config_test = config_test;
  146. cfg->rspamd_user = rspamd_user;
  147. cfg->rspamd_group = rspamd_group;
  148. cfg_num = cfg_names != NULL ? g_strv_length (cfg_names) : 0;
  149. if (cfg_num == 0) {
  150. cfg->cfg_name = FIXED_CONFIG_FILE;
  151. }
  152. else {
  153. cfg->cfg_name = cfg_names[0];
  154. }
  155. for (i = 1; i < cfg_num; i++) {
  156. r = fork ();
  157. if (r == 0) {
  158. /* Spawning new main process */
  159. ottery_init (NULL);
  160. cfg->cfg_name = cfg_names[i];
  161. (void)setsid ();
  162. }
  163. else if (r == -1) {
  164. fprintf (stderr,
  165. "fork failed while spawning process for %s configuration file: %s\n",
  166. cfg_names[i],
  167. strerror (errno));
  168. }
  169. else {
  170. /* Save pid to the list of other main processes, we need it to ignore SIGCHLD from them */
  171. g_array_append_val (other_workers, r);
  172. }
  173. }
  174. cfg->pid_file = rspamd_pidfile;
  175. }
  176. /* Detect privilleged mode */
  177. static void
  178. detect_priv (struct rspamd_main *rspamd_main)
  179. {
  180. struct passwd *pwd;
  181. struct group *grp;
  182. uid_t euid;
  183. euid = geteuid ();
  184. if (euid == 0) {
  185. if (!rspamd_main->cfg->rspamd_user && !is_insecure) {
  186. msg_err_main (
  187. "cannot run rspamd workers as root user, please add -u and -g options to select a proper unprivilleged user or specify --insecure flag");
  188. exit (EXIT_FAILURE);
  189. }
  190. else if (is_insecure) {
  191. rspamd_main->is_privilleged = TRUE;
  192. rspamd_main->workers_uid = 0;
  193. rspamd_main->workers_gid = 0;
  194. }
  195. else {
  196. rspamd_main->is_privilleged = TRUE;
  197. pwd = getpwnam (rspamd_main->cfg->rspamd_user);
  198. if (pwd == NULL) {
  199. msg_err_main ("user specified does not exists (%s), aborting",
  200. strerror (errno));
  201. exit (-errno);
  202. }
  203. if (rspamd_main->cfg->rspamd_group) {
  204. grp = getgrnam (rspamd_main->cfg->rspamd_group);
  205. if (grp == NULL) {
  206. msg_err_main ("group specified does not exists (%s), aborting",
  207. strerror (errno));
  208. exit (-errno);
  209. }
  210. rspamd_main->workers_gid = grp->gr_gid;
  211. }
  212. else {
  213. rspamd_main->workers_gid = (gid_t)-1;
  214. }
  215. rspamd_main->workers_uid = pwd->pw_uid;
  216. }
  217. }
  218. else {
  219. rspamd_main->is_privilleged = FALSE;
  220. rspamd_main->workers_uid = (uid_t)-1;
  221. rspamd_main->workers_gid = (gid_t)-1;
  222. }
  223. }
  224. static void
  225. config_logger (rspamd_mempool_t *pool, gpointer ud)
  226. {
  227. struct rspamd_main *rspamd_main = ud;
  228. if (config_test) {
  229. /* Explicitly set logger type to console in case of config testing */
  230. rspamd_main->cfg->log_type = RSPAMD_LOG_CONSOLE;
  231. }
  232. rspamd_set_logger (rspamd_main->cfg, g_quark_try_string ("main"),
  233. rspamd_main);
  234. if (rspamd_log_open_priv (rspamd_main->logger,
  235. rspamd_main->workers_uid, rspamd_main->workers_gid) == -1) {
  236. fprintf (stderr, "Fatal error, cannot open logfile, exiting\n");
  237. exit (EXIT_FAILURE);
  238. }
  239. }
  240. static void
  241. reread_config (struct rspamd_main *rspamd_main)
  242. {
  243. struct rspamd_config *tmp_cfg;
  244. gchar *cfg_file;
  245. tmp_cfg = (struct rspamd_config *)g_malloc0 (sizeof (struct rspamd_config));
  246. tmp_cfg->c_modules = g_hash_table_ref (rspamd_main->cfg->c_modules);
  247. rspamd_set_logger (tmp_cfg, g_quark_try_string ("main"), rspamd_main);
  248. rspamd_init_cfg (tmp_cfg, TRUE);
  249. cfg_file = rspamd_mempool_strdup (tmp_cfg->cfg_pool,
  250. rspamd_main->cfg->cfg_name);
  251. tmp_cfg->cache = rspamd_symbols_cache_new (tmp_cfg);
  252. /* Save some variables */
  253. tmp_cfg->cfg_name = cfg_file;
  254. if (!load_rspamd_config (rspamd_main, tmp_cfg, FALSE)) {
  255. rspamd_set_logger (rspamd_main->cfg, g_quark_try_string (
  256. "main"), rspamd_main);
  257. msg_err_main ("cannot parse new config file, revert to old one");
  258. rspamd_config_free (tmp_cfg);
  259. }
  260. else {
  261. msg_debug_main ("replacing config");
  262. rspamd_symbols_cache_destroy (rspamd_main->cfg->cache);
  263. rspamd_config_free (rspamd_main->cfg);
  264. g_free (rspamd_main->cfg);
  265. rspamd_main->cfg = tmp_cfg;
  266. rspamd_set_logger (tmp_cfg, g_quark_try_string ("main"), rspamd_main);
  267. /* Force debug log */
  268. if (is_debug) {
  269. rspamd_main->cfg->log_level = G_LOG_LEVEL_DEBUG;
  270. }
  271. rspamd_init_filters (rspamd_main->cfg, TRUE);
  272. rspamd_symbols_cache_init (rspamd_main->cfg->cache);
  273. msg_info_main ("config has been reread successfully");
  274. }
  275. }
  276. struct waiting_worker {
  277. struct rspamd_main *rspamd_main;
  278. struct event wait_ev;
  279. struct rspamd_worker_conf *cf;
  280. guint oldindex;
  281. };
  282. static void
  283. rspamd_fork_delayed_cb (gint signo, short what, gpointer arg)
  284. {
  285. struct waiting_worker *w = arg;
  286. event_del (&w->wait_ev);
  287. rspamd_fork_worker (w->rspamd_main, w->cf, w->oldindex);
  288. g_slice_free1 (sizeof (*w), w);
  289. }
  290. static void
  291. rspamd_fork_delayed (struct rspamd_worker_conf *cf,
  292. guint index,
  293. struct rspamd_main *rspamd_main)
  294. {
  295. struct waiting_worker *nw;
  296. struct timeval tv;
  297. nw = g_slice_alloc (sizeof (*nw));
  298. nw->cf = cf;
  299. nw->oldindex = index;
  300. nw->rspamd_main = rspamd_main;
  301. tv.tv_sec = SOFT_FORK_TIME;
  302. tv.tv_usec = 0;
  303. event_set (&nw->wait_ev, -1, EV_TIMEOUT, rspamd_fork_delayed_cb, nw);
  304. event_base_set (rspamd_main->ev_base, &nw->wait_ev);
  305. event_add (&nw->wait_ev, &tv);
  306. }
  307. static GList *
  308. create_listen_socket (GPtrArray *addrs, guint cnt, gint listen_type)
  309. {
  310. GList *result = NULL;
  311. gint fd;
  312. guint i;
  313. g_ptr_array_sort (addrs, rspamd_inet_address_compare_ptr);
  314. for (i = 0; i < cnt; i ++) {
  315. fd = rspamd_inet_address_listen (g_ptr_array_index (addrs, i),
  316. listen_type, TRUE);
  317. if (fd != -1) {
  318. result = g_list_prepend (result, GINT_TO_POINTER (fd));
  319. }
  320. }
  321. return result;
  322. }
  323. static GList *
  324. systemd_get_socket (struct rspamd_main *rspamd_main, gint number)
  325. {
  326. int sock, num_passed, flags;
  327. GList *result = NULL;
  328. const gchar *e;
  329. gchar *err;
  330. struct stat st;
  331. /* XXX: can we trust the current choice ? */
  332. static const int sd_listen_fds_start = 3;
  333. e = getenv ("LISTEN_FDS");
  334. if (e != NULL) {
  335. errno = 0;
  336. num_passed = strtoul (e, &err, 10);
  337. if ((err == NULL || *err == '\0') && num_passed > number) {
  338. sock = number + sd_listen_fds_start;
  339. if (fstat (sock, &st) == -1) {
  340. msg_warn_main ("cannot stat systemd descriptor %d", sock);
  341. return NULL;
  342. }
  343. if (!S_ISSOCK (st.st_mode)) {
  344. msg_warn_main ("systemd descriptor %d is not a socket", sock);
  345. errno = EINVAL;
  346. return NULL;
  347. }
  348. flags = fcntl (sock, F_GETFD);
  349. if (flags != -1) {
  350. (void)fcntl (sock, F_SETFD, flags | FD_CLOEXEC);
  351. }
  352. result = g_list_prepend (result, GINT_TO_POINTER (sock));
  353. }
  354. else if (num_passed <= number) {
  355. msg_warn_main ("systemd LISTEN_FDS does not contain the expected fd: %d",
  356. num_passed);
  357. errno = EOVERFLOW;
  358. }
  359. }
  360. else {
  361. msg_warn_main ("cannot get systemd variable 'LISTEN_FDS'");
  362. errno = ENOENT;
  363. }
  364. return result;
  365. }
  366. static inline uintptr_t
  367. make_listen_key (struct rspamd_worker_bind_conf *cf)
  368. {
  369. XXH64_state_t st;
  370. guint i, keylen;
  371. guint8 *key;
  372. rspamd_inet_addr_t *addr;
  373. guint16 port;
  374. XXH64_reset (&st, rspamd_hash_seed ());
  375. if (cf->is_systemd) {
  376. XXH64_update (&st, "systemd", sizeof ("systemd"));
  377. XXH64_update (&st, &cf->cnt, sizeof (cf->cnt));
  378. }
  379. else {
  380. XXH64_update (&st, cf->name, strlen (cf->name));
  381. for (i = 0; i < cf->cnt; i ++) {
  382. addr = g_ptr_array_index (cf->addrs, i);
  383. key = rspamd_inet_address_get_radix_key (
  384. addr, &keylen);
  385. XXH64_update (&st, key, keylen);
  386. port = rspamd_inet_address_get_port (addr);
  387. XXH64_update (&st, &port, sizeof (port));
  388. }
  389. }
  390. return XXH64_digest (&st);
  391. }
  392. static void
  393. spawn_workers (struct rspamd_main *rspamd_main)
  394. {
  395. GList *cur, *ls;
  396. struct rspamd_worker_conf *cf;
  397. gint i;
  398. gpointer p;
  399. guintptr key;
  400. struct rspamd_worker_bind_conf *bcf;
  401. gboolean listen_ok = FALSE;
  402. cur = rspamd_main->cfg->workers;
  403. while (cur) {
  404. cf = cur->data;
  405. listen_ok = FALSE;
  406. if (cf->worker == NULL) {
  407. msg_err_main ("type of worker is unspecified, skip spawning");
  408. }
  409. else {
  410. if (cf->worker->has_socket) {
  411. LL_FOREACH (cf->bind_conf, bcf) {
  412. key = make_listen_key (bcf);
  413. if ((p =
  414. g_hash_table_lookup (listen_sockets,
  415. GINT_TO_POINTER (key))) == NULL) {
  416. if (!bcf->is_systemd) {
  417. /* Create listen socket */
  418. ls = create_listen_socket (bcf->addrs, bcf->cnt,
  419. cf->worker->listen_type);
  420. }
  421. else {
  422. ls = systemd_get_socket (rspamd_main, bcf->cnt);
  423. }
  424. if (ls == NULL) {
  425. msg_err_main ("cannot listen on socket %s: %s",
  426. bcf->name,
  427. strerror (errno));
  428. }
  429. else {
  430. g_hash_table_insert (listen_sockets, (gpointer)key, ls);
  431. listen_ok = TRUE;
  432. }
  433. }
  434. else {
  435. /* We had socket for this type of worker */
  436. ls = p;
  437. listen_ok = TRUE;
  438. }
  439. /* Do not add existing lists as it causes loops */
  440. if (g_list_position (cf->listen_socks, ls) == -1) {
  441. cf->listen_socks = g_list_concat (cf->listen_socks, ls);
  442. }
  443. }
  444. }
  445. if (listen_ok) {
  446. if (cf->worker->unique) {
  447. if (cf->count > 1) {
  448. msg_warn_main ("cannot spawn more than 1 %s worker, so spawn one",
  449. cf->worker->name);
  450. }
  451. rspamd_fork_worker (rspamd_main, cf, 0);
  452. }
  453. else if (cf->worker->threaded) {
  454. rspamd_fork_worker (rspamd_main, cf, 0);
  455. }
  456. else {
  457. for (i = 0; i < cf->count; i++) {
  458. rspamd_fork_worker (rspamd_main, cf, i);
  459. }
  460. }
  461. }
  462. else {
  463. msg_err_main ("cannot create listen socket for %s at %s",
  464. g_quark_to_string (cf->type), cf->bind_conf->name);
  465. exit (EXIT_FAILURE);
  466. }
  467. }
  468. cur = g_list_next (cur);
  469. }
  470. }
  471. static void
  472. kill_old_workers (gpointer key, gpointer value, gpointer unused)
  473. {
  474. struct rspamd_worker *w = value;
  475. struct rspamd_main *rspamd_main;
  476. rspamd_main = w->srv;
  477. kill (w->pid, SIGUSR2);
  478. msg_info_main ("send signal to worker %P", w->pid);
  479. }
  480. static gboolean
  481. wait_for_workers (gpointer key, gpointer value, gpointer unused)
  482. {
  483. struct rspamd_worker *w = value;
  484. struct rspamd_main *rspamd_main;
  485. gint res = 0;
  486. rspamd_main = w->srv;
  487. if (waitpid (w->pid, &res, WNOHANG) <= 0) {
  488. if (term_attempts == 0) {
  489. if (w->cf->worker->killable) {
  490. msg_info_main ("terminate worker %P with SIGKILL", w->pid);
  491. kill (w->pid, SIGKILL);
  492. }
  493. else {
  494. msg_info_main ("waiting for workers to sync");
  495. }
  496. }
  497. return FALSE;
  498. }
  499. msg_info_main ("%s process %P terminated %s", g_quark_to_string (
  500. w->type), w->pid,
  501. WTERMSIG (res) == SIGKILL ? "hardly" : "softly");
  502. g_free (w->cf);
  503. g_free (w);
  504. return TRUE;
  505. }
  506. static void
  507. reopen_log_handler (gpointer key, gpointer value, gpointer unused)
  508. {
  509. struct rspamd_worker *w = value;
  510. struct rspamd_main *rspamd_main;
  511. rspamd_main = w->srv;
  512. if (kill (w->pid, SIGUSR1) == -1) {
  513. msg_err_main ("kill failed for pid %P: %s", w->pid, strerror (errno));
  514. }
  515. }
  516. static gboolean
  517. load_rspamd_config (struct rspamd_main *rspamd_main,
  518. struct rspamd_config *cfg, gboolean init_modules)
  519. {
  520. cfg->cache = rspamd_symbols_cache_new (cfg);
  521. cfg->compiled_modules = modules;
  522. cfg->compiled_workers = workers;
  523. if (!rspamd_config_read (cfg, cfg->cfg_name, NULL,
  524. config_logger, rspamd_main, ucl_vars)) {
  525. return FALSE;
  526. }
  527. /* Strictly set temp dir */
  528. if (!cfg->temp_dir) {
  529. msg_warn_main ("tempdir is not set, trying to use $TMPDIR");
  530. cfg->temp_dir =
  531. rspamd_mempool_strdup (cfg->cfg_pool, getenv ("TMPDIR"));
  532. if (!cfg->temp_dir) {
  533. msg_warn_main ("$TMPDIR is empty too, using /tmp as default");
  534. cfg->temp_dir = rspamd_mempool_strdup (cfg->cfg_pool, "/tmp");
  535. }
  536. }
  537. /* Do post-load actions */
  538. rspamd_config_post_load (cfg);
  539. if (init_modules) {
  540. rspamd_init_filters (cfg, FALSE);
  541. }
  542. return TRUE;
  543. }
  544. static gint
  545. perform_lua_tests (struct rspamd_config *cfg)
  546. {
  547. rspamd_fprintf (stderr, "use rspamadm lua for this operation\n");
  548. return EXIT_FAILURE;
  549. }
  550. static gint
  551. perform_configs_sign (void)
  552. {
  553. rspamd_fprintf (stderr, "use rspamadm sign for this operation\n");
  554. return EXIT_FAILURE;
  555. }
  556. static void
  557. do_encrypt_password (void)
  558. {
  559. rspamd_fprintf (stderr, "use rspamadm pw for this operation\n");
  560. }
  561. /* Signal handlers */
  562. static void
  563. rspamd_term_handler (gint signo, short what, gpointer arg)
  564. {
  565. struct rspamd_main *rspamd_main = arg;
  566. msg_info_main ("catch termination signal, waiting for children");
  567. rspamd_pass_signal (rspamd_main->workers, signo);
  568. event_base_loopexit (rspamd_main->ev_base, NULL);
  569. }
  570. static void
  571. rspamd_usr1_handler (gint signo, short what, gpointer arg)
  572. {
  573. struct rspamd_main *rspamd_main = arg;
  574. rspamd_log_reopen_priv (rspamd_main->logger,
  575. rspamd_main->workers_uid,
  576. rspamd_main->workers_gid);
  577. g_hash_table_foreach (rspamd_main->workers, reopen_log_handler,
  578. NULL);
  579. }
  580. static void
  581. rspamd_hup_handler (gint signo, short what, gpointer arg)
  582. {
  583. struct rspamd_main *rspamd_main = arg;
  584. rspamd_log_reopen_priv (rspamd_main->logger,
  585. rspamd_main->workers_uid,
  586. rspamd_main->workers_gid);
  587. msg_info_main ("rspamd "
  588. RVERSION
  589. " is restarting");
  590. g_hash_table_foreach (rspamd_main->workers, kill_old_workers, NULL);
  591. rspamd_map_remove_all (rspamd_main->cfg);
  592. reread_config (rspamd_main);
  593. spawn_workers (rspamd_main);
  594. }
  595. static void
  596. rspamd_cld_handler (gint signo, short what, gpointer arg)
  597. {
  598. struct rspamd_main *rspamd_main = arg;
  599. guint i;
  600. gint res = 0;
  601. struct rspamd_worker *cur;
  602. pid_t wrk;
  603. msg_debug_main ("catch SIGCHLD signal, finding terminated worker");
  604. /* Remove dead child form children list */
  605. wrk = waitpid (0, &res, 0);
  606. if ((cur =
  607. g_hash_table_lookup (rspamd_main->workers,
  608. GSIZE_TO_POINTER (wrk))) != NULL) {
  609. /* Unlink dead process from queue and hash table */
  610. g_hash_table_remove (rspamd_main->workers, GSIZE_TO_POINTER (
  611. wrk));
  612. if (WIFEXITED (res) && WEXITSTATUS (res) == 0) {
  613. /* Normal worker termination, do not fork one more */
  614. msg_info_main ("%s process %P terminated normally",
  615. g_quark_to_string (cur->type),
  616. cur->pid);
  617. }
  618. else {
  619. if (WIFSIGNALED (res)) {
  620. #ifdef WCOREDUMP
  621. if (WCOREDUMP (res)) {
  622. msg_warn_main (
  623. "%s process %P terminated abnormally by signal: %d"
  624. " and created core file",
  625. g_quark_to_string (cur->type),
  626. cur->pid,
  627. WTERMSIG (res));
  628. }
  629. else {
  630. msg_warn_main (
  631. "%s process %P terminated abnormally by signal: %d"
  632. " but NOT created core file",
  633. g_quark_to_string (cur->type),
  634. cur->pid,
  635. WTERMSIG (res));
  636. }
  637. #else
  638. msg_warn_main (
  639. "%s process %P terminated abnormally by signal: %d",
  640. g_quark_to_string (cur->type),
  641. cur->pid,
  642. WTERMSIG (res));
  643. #endif
  644. }
  645. else {
  646. msg_warn_main ("%s process %P terminated abnormally "
  647. "with exit code %d",
  648. g_quark_to_string (cur->type),
  649. cur->pid,
  650. WEXITSTATUS (res));
  651. }
  652. /* Fork another worker in replace of dead one */
  653. rspamd_fork_delayed (cur->cf, cur->index, rspamd_main);
  654. }
  655. g_free (cur);
  656. }
  657. else {
  658. for (i = 0; i < other_workers->len; i++) {
  659. if (g_array_index (other_workers, pid_t, i) == wrk) {
  660. g_array_remove_index_fast (other_workers, i);
  661. msg_info_main ("related process %P terminated", wrk);
  662. }
  663. }
  664. }
  665. }
  666. static void
  667. rspamd_final_term_handler (gint signo, short what, gpointer arg)
  668. {
  669. struct rspamd_main *rspamd_main = arg;
  670. if (term_attempts) {
  671. term_attempts--;
  672. }
  673. g_hash_table_foreach_remove (rspamd_main->workers, wait_for_workers, NULL);
  674. if (g_hash_table_size (rspamd_main->workers) == 0) {
  675. event_base_loopexit (rspamd_main->ev_base, NULL);
  676. }
  677. }
  678. /* Control socket handler */
  679. static void
  680. rspamd_control_handler (gint fd, short what, gpointer arg)
  681. {
  682. struct rspamd_main *rspamd_main = arg;
  683. rspamd_inet_addr_t *addr;
  684. gint nfd;
  685. if ((nfd =
  686. rspamd_accept_from_socket (fd, &addr)) == -1) {
  687. msg_warn_main ("accept failed: %s", strerror (errno));
  688. return;
  689. }
  690. /* Check for EAGAIN */
  691. if (nfd == 0) {
  692. return;
  693. }
  694. msg_info_main ("accepted control connection from %s",
  695. rspamd_inet_address_to_string (addr));
  696. rspamd_control_process_client_socket (rspamd_main, nfd);
  697. }
  698. gint
  699. main (gint argc, gchar **argv, gchar **env)
  700. {
  701. gint i, res = 0;
  702. struct sigaction signals, sigpipe_act;
  703. worker_t **pworker;
  704. GQuark type;
  705. rspamd_inet_addr_t *control_addr = NULL;
  706. struct event_base *ev_base;
  707. struct event term_ev, int_ev, cld_ev, hup_ev, usr1_ev, control_ev;
  708. struct timeval term_tv;
  709. struct rspamd_main *rspamd_main;
  710. #if ((GLIB_MAJOR_VERSION == 2) && (GLIB_MINOR_VERSION <= 30))
  711. g_thread_init (NULL);
  712. #endif
  713. rspamd_main = (struct rspamd_main *) g_malloc0 (sizeof (struct rspamd_main));
  714. rspamd_main->server_pool = rspamd_mempool_new (rspamd_mempool_suggest_size (),
  715. "main");
  716. rspamd_main->stat = rspamd_mempool_alloc0_shared (rspamd_main->server_pool,
  717. sizeof (struct rspamd_stat));
  718. rspamd_main->cfg =
  719. (struct rspamd_config *) g_malloc0 (sizeof (struct rspamd_config));
  720. #ifndef HAVE_SETPROCTITLE
  721. init_title (argc, argv, env);
  722. #endif
  723. rspamd_init_libs ();
  724. rspamd_init_cfg (rspamd_main->cfg, TRUE);
  725. memset (&signals, 0, sizeof (struct sigaction));
  726. other_workers = g_array_new (FALSE, TRUE, sizeof (pid_t));
  727. read_cmd_line (&argc, &argv, rspamd_main->cfg);
  728. if (argc > 0) {
  729. /* Parse variables */
  730. for (i = 0; i < argc; i++) {
  731. if (strchr (argv[i], '=') != NULL) {
  732. gchar *k, *v, *t;
  733. k = g_strdup (argv[i]);
  734. t = strchr (k, '=');
  735. v = g_strdup (t + 1);
  736. *t = '\0';
  737. if (ucl_vars == NULL) {
  738. ucl_vars = g_hash_table_new_full (rspamd_strcase_hash,
  739. rspamd_strcase_equal, g_free, g_free);
  740. }
  741. g_hash_table_insert (ucl_vars, k, v);
  742. }
  743. }
  744. }
  745. if (rspamd_main->cfg->config_test || is_debug) {
  746. rspamd_main->cfg->log_level = G_LOG_LEVEL_DEBUG;
  747. }
  748. else {
  749. rspamd_main->cfg->log_level = G_LOG_LEVEL_WARNING;
  750. }
  751. type = g_quark_from_static_string ("main");
  752. /* First set logger to console logger */
  753. rspamd_main->cfg->log_type = RSPAMD_LOG_CONSOLE;
  754. rspamd_set_logger (rspamd_main->cfg, type, rspamd_main);
  755. (void) rspamd_log_open (rspamd_main->logger);
  756. g_log_set_default_handler (rspamd_glib_log_function, rspamd_main->logger);
  757. g_set_printerr_handler (rspamd_glib_printerr_function);
  758. detect_priv (rspamd_main);
  759. pworker = &workers[0];
  760. while (*pworker) {
  761. /* Init string quarks */
  762. (void) g_quark_from_static_string ((*pworker)->name);
  763. pworker++;
  764. }
  765. /* Init listen sockets hash */
  766. listen_sockets = g_hash_table_new (g_direct_hash, g_direct_equal);
  767. /* If we want to test lua skip everything except it */
  768. if (lua_tests != NULL && lua_tests[0] != NULL) {
  769. exit (perform_lua_tests (rspamd_main->cfg));
  770. }
  771. /* If we want to sign configs, just do it */
  772. if (sign_configs != NULL && privkey != NULL) {
  773. exit (perform_configs_sign ());
  774. }
  775. /* Same for keypair creation */
  776. if (gen_keypair) {
  777. rspamd_fprintf (stderr, "use rspamadm keypair for this operation\n");
  778. exit (EXIT_FAILURE);
  779. }
  780. if (encrypt_password) {
  781. do_encrypt_password ();
  782. exit (EXIT_SUCCESS);
  783. }
  784. if (rspamd_main->cfg->config_test || dump_cache) {
  785. if (!load_rspamd_config (rspamd_main, rspamd_main->cfg, FALSE)) {
  786. exit (EXIT_FAILURE);
  787. }
  788. res = TRUE;
  789. rspamd_symbols_cache_init (rspamd_main->cfg->cache);
  790. if (!rspamd_init_filters (rspamd_main->cfg, FALSE)) {
  791. res = FALSE;
  792. }
  793. /* Insert classifiers symbols */
  794. rspamd_config_insert_classify_symbols (rspamd_main->cfg);
  795. if (!rspamd_symbols_cache_validate (rspamd_main->cfg->cache,
  796. rspamd_main->cfg,
  797. FALSE)) {
  798. res = FALSE;
  799. }
  800. if (dump_cache) {
  801. msg_err_main ("Use rspamc counters for dumping cache");
  802. exit (EXIT_FAILURE);
  803. }
  804. fprintf (stderr, "syntax %s\n", res ? "OK" : "BAD");
  805. return res ? EXIT_SUCCESS : EXIT_FAILURE;
  806. }
  807. /* Load config */
  808. if (!load_rspamd_config (rspamd_main, rspamd_main->cfg, TRUE)) {
  809. exit (EXIT_FAILURE);
  810. }
  811. /* Override pidfile from configuration by command line argument */
  812. if (rspamd_pidfile != NULL) {
  813. rspamd_main->cfg->pid_file = rspamd_pidfile;
  814. }
  815. /* Force debug log */
  816. if (is_debug) {
  817. rspamd_main->cfg->log_level = G_LOG_LEVEL_DEBUG;
  818. }
  819. /* Create rolling history */
  820. rspamd_main->history = rspamd_roll_history_new (rspamd_main->server_pool,
  821. rspamd_main->cfg->history_rows);
  822. gperf_profiler_init (rspamd_main->cfg, "main");
  823. msg_info_main ("rspamd "
  824. RVERSION
  825. " is starting, build id: "
  826. RID);
  827. rspamd_main->cfg->cfg_name = rspamd_mempool_strdup (
  828. rspamd_main->cfg->cfg_pool,
  829. rspamd_main->cfg->cfg_name);
  830. /* Daemonize */
  831. if (!rspamd_main->cfg->no_fork && daemon (0, 0) == -1) {
  832. fprintf (stderr, "Cannot daemonize\n");
  833. exit (-errno);
  834. }
  835. /* Write info */
  836. rspamd_main->pid = getpid ();
  837. rspamd_main->type = type;
  838. /* Ignore SIGPIPE as we handle write errors manually */
  839. sigemptyset (&sigpipe_act.sa_mask);
  840. sigaddset (&sigpipe_act.sa_mask, SIGPIPE);
  841. sigpipe_act.sa_handler = SIG_IGN;
  842. sigpipe_act.sa_flags = 0;
  843. sigaction (SIGPIPE, &sigpipe_act, NULL);
  844. if (rspamd_main->cfg->pid_file == NULL) {
  845. msg_info("pid file is not specified, skipping writing it");
  846. }
  847. else if (rspamd_write_pid (rspamd_main) == -1) {
  848. msg_err_main ("cannot write pid file %s", rspamd_main->cfg->pid_file);
  849. exit (-errno);
  850. }
  851. /* Block signals to use sigsuspend in future */
  852. sigprocmask (SIG_BLOCK, &signals.sa_mask, NULL);
  853. /* Set title */
  854. setproctitle ("main process");
  855. /* Init config cache */
  856. rspamd_symbols_cache_init (rspamd_main->cfg->cache);
  857. /* Validate cache */
  858. (void) rspamd_symbols_cache_validate (rspamd_main->cfg->cache,
  859. rspamd_main->cfg,
  860. FALSE);
  861. /* Flush log */
  862. rspamd_log_flush (rspamd_main->logger);
  863. /* Open control socket if needed */
  864. control_fd = -1;
  865. if (rspamd_main->cfg->control_socket_path) {
  866. if (!rspamd_parse_inet_address (&control_addr,
  867. rspamd_main->cfg->control_socket_path,
  868. 0)) {
  869. msg_err_main ("cannot parse inet address %s",
  870. rspamd_main->cfg->control_socket_path);
  871. }
  872. else {
  873. control_fd = rspamd_inet_address_listen (control_addr, SOCK_STREAM,
  874. TRUE);
  875. if (control_fd == -1) {
  876. msg_err_main ("cannot open control socket at path: %s",
  877. rspamd_main->cfg->control_socket_path);
  878. }
  879. }
  880. }
  881. /* Maybe read roll history */
  882. if (rspamd_main->cfg->history_file) {
  883. rspamd_roll_history_load (rspamd_main->history,
  884. rspamd_main->cfg->history_file);
  885. }
  886. #if defined(WITH_GPERF_TOOLS)
  887. ProfilerStop ();
  888. #endif
  889. /* Spawn workers */
  890. rspamd_main->workers = g_hash_table_new (g_direct_hash, g_direct_equal);
  891. spawn_workers (rspamd_main);
  892. /* Init event base */
  893. ev_base = event_init ();
  894. rspamd_main->ev_base = ev_base;
  895. /* Unblock signals */
  896. sigemptyset (&signals.sa_mask);
  897. sigprocmask (SIG_SETMASK, &signals.sa_mask, NULL);
  898. /* Set events for signals */
  899. evsignal_set (&term_ev, SIGTERM, rspamd_term_handler, rspamd_main);
  900. event_base_set (ev_base, &term_ev);
  901. event_add (&term_ev, NULL);
  902. evsignal_set (&int_ev, SIGINT, rspamd_term_handler, rspamd_main);
  903. event_base_set (ev_base, &int_ev);
  904. event_add (&int_ev, NULL);
  905. evsignal_set (&hup_ev, SIGHUP, rspamd_hup_handler, rspamd_main);
  906. event_base_set (ev_base, &hup_ev);
  907. event_add (&hup_ev, NULL);
  908. evsignal_set (&cld_ev, SIGCHLD, rspamd_cld_handler, rspamd_main);
  909. event_base_set (ev_base, &cld_ev);
  910. event_add (&cld_ev, NULL);
  911. evsignal_set (&usr1_ev, SIGUSR1, rspamd_usr1_handler, rspamd_main);
  912. event_base_set (ev_base, &usr1_ev);
  913. event_add (&usr1_ev, NULL);
  914. if (control_fd != -1) {
  915. msg_info_main ("listening for control commands on %s",
  916. rspamd_inet_address_to_string (control_addr));
  917. event_set (&control_ev, control_fd, EV_READ|EV_PERSIST,
  918. rspamd_control_handler, rspamd_main);
  919. event_base_set (ev_base, &control_ev);
  920. event_add (&control_ev, NULL);
  921. }
  922. event_base_loop (ev_base, 0);
  923. /* We need to block signals unless children are waited for */
  924. rspamd_worker_block_signals ();
  925. event_del (&term_ev);
  926. event_del (&int_ev);
  927. event_del (&hup_ev);
  928. event_del (&cld_ev);
  929. event_del (&usr1_ev);
  930. if (control_fd != -1) {
  931. event_del (&control_ev);
  932. close (control_fd);
  933. }
  934. if (getenv ("G_SLICE") != NULL) {
  935. /* Special case if we are likely running with valgrind */
  936. term_attempts = TERMINATION_ATTEMPTS * 10;
  937. }
  938. else {
  939. term_attempts = TERMINATION_ATTEMPTS;
  940. }
  941. /* Check each 200 ms */
  942. term_tv.tv_sec = 0;
  943. term_tv.tv_usec = 200000;
  944. /* Wait for workers termination */
  945. g_hash_table_foreach_remove (rspamd_main->workers, wait_for_workers, NULL);
  946. event_set (&term_ev, -1, EV_TIMEOUT|EV_PERSIST,
  947. rspamd_final_term_handler, rspamd_main);
  948. event_base_set (ev_base, &term_ev);
  949. event_add (&term_ev, &term_tv);
  950. event_base_loop (ev_base, 0);
  951. event_del (&term_ev);
  952. /* Maybe save roll history */
  953. if (rspamd_main->cfg->history_file) {
  954. rspamd_roll_history_save (rspamd_main->history,
  955. rspamd_main->cfg->history_file);
  956. }
  957. msg_info_main ("terminating...");
  958. rspamd_symbols_cache_destroy (rspamd_main->cfg->cache);
  959. rspamd_log_close (rspamd_main->logger);
  960. rspamd_config_free (rspamd_main->cfg);
  961. g_free (rspamd_main->cfg);
  962. g_free (rspamd_main);
  963. event_base_free (ev_base);
  964. g_mime_shutdown ();
  965. #ifdef HAVE_OPENSSL
  966. EVP_cleanup ();
  967. ERR_free_strings ();
  968. #endif
  969. return (res);
  970. }