Nelze vybrat více než 25 témat Téma musí začínat písmenem nebo číslem, může obsahovat pomlčky („-“) a může být dlouhé až 35 znaků.

rspamd_proxy.c 38KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "libutil/util.h"
  18. #include "libutil/map.h"
  19. #include "libutil/upstream.h"
  20. #include "libutil/http.h"
  21. #include "libutil/http_private.h"
  22. #include "libserver/protocol.h"
  23. #include "libserver/cfg_file.h"
  24. #include "libserver/url.h"
  25. #include "libserver/dns.h"
  26. #include "libmime/message.h"
  27. #include "rspamd.h"
  28. #include "libserver/worker_util.h"
  29. #include "lua/lua_common.h"
  30. #include "keypairs_cache.h"
  31. #include "ottery.h"
  32. #include "unix-std.h"
  33. /* Rotate keys each minute by default */
  34. #define DEFAULT_ROTATION_TIME 60.0
  35. #define DEFAULT_RETRIES 5
  36. #define msg_err_session(...) rspamd_default_log_function (G_LOG_LEVEL_CRITICAL, \
  37. session->pool->tag.tagname, session->pool->tag.uid, \
  38. G_STRFUNC, \
  39. __VA_ARGS__)
  40. #define msg_warn_session(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  41. session->pool->tag.tagname, session->pool->tag.uid, \
  42. G_STRFUNC, \
  43. __VA_ARGS__)
  44. #define msg_info_session(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  45. session->pool->tag.tagname, session->pool->tag.uid, \
  46. G_STRFUNC, \
  47. __VA_ARGS__)
  48. #define msg_debug_session(...) rspamd_default_log_function (G_LOG_LEVEL_DEBUG, \
  49. session->pool->tag.tagname, session->pool->tag.uid, \
  50. G_STRFUNC, \
  51. __VA_ARGS__)
  52. gpointer init_rspamd_proxy (struct rspamd_config *cfg);
  53. void start_rspamd_proxy (struct rspamd_worker *worker);
  54. worker_t rspamd_proxy_worker = {
  55. "rspamd_proxy", /* Name */
  56. init_rspamd_proxy, /* Init function */
  57. start_rspamd_proxy, /* Start function */
  58. RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE,
  59. RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */
  60. RSPAMD_WORKER_VER
  61. };
  62. struct rspamd_http_upstream {
  63. gchar *name;
  64. struct upstream_list *u;
  65. struct rspamd_cryptobox_pubkey *key;
  66. gdouble timeout;
  67. struct timeval io_tv;
  68. gint parser_from_ref;
  69. gint parser_to_ref;
  70. gboolean local;
  71. };
  72. struct rspamd_http_mirror {
  73. gchar *name;
  74. gchar *settings_id;
  75. struct upstream_list *u;
  76. struct rspamd_cryptobox_pubkey *key;
  77. gdouble prob;
  78. gdouble timeout;
  79. struct timeval io_tv;
  80. gint parser_from_ref;
  81. gint parser_to_ref;
  82. gboolean local;
  83. };
  84. static const guint64 rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL;
  85. struct rspamd_proxy_ctx {
  86. guint64 magic;
  87. gdouble timeout;
  88. struct timeval io_tv;
  89. struct rspamd_config *cfg;
  90. /* DNS resolver */
  91. struct rspamd_dns_resolver *resolver;
  92. /* Events base */
  93. struct event_base *ev_base;
  94. /* Encryption key for clients */
  95. struct rspamd_cryptobox_keypair *key;
  96. /* Keys cache */
  97. struct rspamd_keypair_cache *keys_cache;
  98. /* Upstreams to use */
  99. GHashTable *upstreams;
  100. /* Mirrors to send traffic to */
  101. GPtrArray *mirrors;
  102. /* Default upstream */
  103. struct rspamd_http_upstream *default_upstream;
  104. /* Local rotating keypair for upstreams */
  105. struct rspamd_cryptobox_keypair *local_key;
  106. struct event rotate_ev;
  107. gdouble rotate_tm;
  108. lua_State *lua_state;
  109. /* Array of callback functions called on end of scan to compare results */
  110. GArray *cmp_refs;
  111. /* Maximum count for retries */
  112. guint max_retries;
  113. };
  114. enum rspamd_backend_flags {
  115. RSPAMD_BACKEND_REPLIED = 1 << 0,
  116. RSPAMD_BACKEND_CLOSED = 1 << 1,
  117. RSPAMD_BACKEND_PARSED = 1 << 2,
  118. };
  119. struct rspamd_proxy_session;
  120. struct rspamd_proxy_backend_connection {
  121. const gchar *name;
  122. struct rspamd_cryptobox_keypair *local_key;
  123. struct rspamd_cryptobox_pubkey *remote_key;
  124. struct upstream *up;
  125. struct rspamd_http_connection *backend_conn;
  126. ucl_object_t *results;
  127. const gchar *err;
  128. struct rspamd_proxy_session *s;
  129. struct timeval *io_tv;
  130. gint backend_sock;
  131. enum rspamd_backend_flags flags;
  132. gint parser_from_ref;
  133. gint parser_to_ref;
  134. };
  135. struct rspamd_proxy_session {
  136. rspamd_mempool_t *pool;
  137. struct rspamd_proxy_ctx *ctx;
  138. rspamd_inet_addr_t *client_addr;
  139. struct rspamd_http_connection *client_conn;
  140. gpointer map;
  141. gchar *fname;
  142. gpointer shmem_ref;
  143. struct rspamd_proxy_backend_connection *master_conn;
  144. struct rspamd_http_message *client_message;
  145. GPtrArray *mirror_conns;
  146. gsize map_len;
  147. gint client_sock;
  148. gboolean is_spamc;
  149. gint retries;
  150. ref_entry_t ref;
  151. };
  152. static gboolean proxy_send_master_message (struct rspamd_proxy_session *session);
  153. static GQuark
  154. rspamd_proxy_quark (void)
  155. {
  156. return g_quark_from_static_string ("rspamd-proxy");
  157. }
  158. static gboolean
  159. rspamd_proxy_parse_lua_parser (lua_State *L, const ucl_object_t *obj,
  160. gint *ref_from, gint *ref_to, GError **err)
  161. {
  162. const gchar *lua_script;
  163. gsize slen;
  164. gint err_idx, ref_idx;
  165. GString *tb = NULL;
  166. gboolean has_ref = FALSE;
  167. g_assert (obj != NULL);
  168. g_assert (ref_from != NULL);
  169. g_assert (ref_to != NULL);
  170. *ref_from = -1;
  171. *ref_to = -1;
  172. lua_script = ucl_object_tolstring (obj, &slen);
  173. lua_pushcfunction (L, &rspamd_lua_traceback);
  174. err_idx = lua_gettop (L);
  175. /* Load data */
  176. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  177. g_set_error (err,
  178. rspamd_proxy_quark (),
  179. EINVAL,
  180. "cannot load lua parser script: %s",
  181. lua_tostring (L, -1));
  182. lua_settop (L, 0); /* Error function */
  183. return FALSE;
  184. }
  185. /* Now do it */
  186. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  187. tb = lua_touserdata (L, -1);
  188. g_set_error (err,
  189. rspamd_proxy_quark (),
  190. EINVAL,
  191. "cannot init lua parser script: %s",
  192. tb->str);
  193. g_string_free (tb, TRUE);
  194. lua_settop (L, 0);
  195. return FALSE;
  196. }
  197. if (lua_istable (L, -1)) {
  198. /*
  199. * We have a table, so we check for two keys:
  200. * 'from' -> function
  201. * 'to' -> function
  202. *
  203. * From converts parent request to a client one
  204. * To converts client request to a parent one
  205. */
  206. lua_pushstring (L, "from");
  207. lua_gettable (L, -2);
  208. if (lua_isfunction (L, -1)) {
  209. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  210. *ref_from = ref_idx;
  211. has_ref = TRUE;
  212. }
  213. lua_pushstring (L, "to");
  214. lua_gettable (L, -2);
  215. if (lua_isfunction (L, -1)) {
  216. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  217. *ref_to = ref_idx;
  218. has_ref = TRUE;
  219. }
  220. }
  221. else if (!lua_isfunction (L, -1)) {
  222. g_set_error (err,
  223. rspamd_proxy_quark (),
  224. EINVAL,
  225. "cannot init lua parser script: "
  226. "must return function");
  227. lua_settop (L, 0);
  228. return FALSE;
  229. }
  230. else {
  231. /* Just parser from protocol */
  232. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  233. *ref_from = ref_idx;
  234. lua_settop (L, 0);
  235. has_ref = TRUE;
  236. }
  237. return has_ref;
  238. }
  239. static gboolean
  240. rspamd_proxy_parse_upstream (rspamd_mempool_t *pool,
  241. const ucl_object_t *obj,
  242. gpointer ud,
  243. struct rspamd_rcl_section *section,
  244. GError **err)
  245. {
  246. const ucl_object_t *elt;
  247. struct rspamd_http_upstream *up = NULL;
  248. struct rspamd_proxy_ctx *ctx;
  249. struct rspamd_rcl_struct_parser *pd = ud;
  250. lua_State *L;
  251. ctx = pd->user_struct;
  252. L = ctx->lua_state;
  253. if (ucl_object_type (obj) != UCL_OBJECT) {
  254. g_set_error (err, rspamd_proxy_quark (), 100,
  255. "upstream option must be an object");
  256. return FALSE;
  257. }
  258. elt = ucl_object_lookup (obj, "name");
  259. if (elt == NULL) {
  260. g_set_error (err, rspamd_proxy_quark (), 100,
  261. "upstream option must have some name definition");
  262. return FALSE;
  263. }
  264. up = g_slice_alloc0 (sizeof (*up));
  265. up->parser_from_ref = -1;
  266. up->parser_to_ref = -1;
  267. up->name = g_strdup (ucl_object_tostring (elt));
  268. up->timeout = ctx->timeout;
  269. elt = ucl_object_lookup (obj, "key");
  270. if (elt != NULL) {
  271. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  272. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  273. if (up->key == NULL) {
  274. g_set_error (err, rspamd_proxy_quark (), 100,
  275. "cannot read upstream key");
  276. goto err;
  277. }
  278. }
  279. elt = ucl_object_lookup (obj, "hosts");
  280. if (elt == NULL) {
  281. g_set_error (err, rspamd_proxy_quark (), 100,
  282. "upstream option must have some hosts definition");
  283. goto err;
  284. }
  285. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  286. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  287. g_set_error (err, rspamd_proxy_quark (), 100,
  288. "upstream has bad hosts definition");
  289. goto err;
  290. }
  291. elt = ucl_object_lookup (obj, "default");
  292. if (elt && ucl_object_toboolean (elt)) {
  293. ctx->default_upstream = up;
  294. }
  295. elt = ucl_object_lookup (obj, "local");
  296. if (elt && ucl_object_toboolean (elt)) {
  297. up->local = TRUE;
  298. }
  299. elt = ucl_object_lookup (obj, "timeout");
  300. if (elt) {
  301. ucl_object_todouble_safe (elt, &up->timeout);
  302. }
  303. /*
  304. * Accept lua function here in form
  305. * fun :: String -> UCL
  306. */
  307. elt = ucl_object_lookup (obj, "parser");
  308. if (elt) {
  309. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  310. &up->parser_to_ref, err)) {
  311. goto err;
  312. }
  313. }
  314. double_to_tv (up->timeout, &up->io_tv);
  315. g_hash_table_insert (ctx->upstreams, up->name, up);
  316. return TRUE;
  317. err:
  318. if (up) {
  319. g_free (up->name);
  320. rspamd_upstreams_destroy (up->u);
  321. if (up->key) {
  322. rspamd_pubkey_unref (up->key);
  323. }
  324. if (up->parser_from_ref != -1) {
  325. luaL_unref (L, LUA_REGISTRYINDEX, up->parser_from_ref);
  326. }
  327. if (up->parser_to_ref != -1) {
  328. luaL_unref (L, LUA_REGISTRYINDEX, up->parser_to_ref);
  329. }
  330. g_slice_free1 (sizeof (*up), up);
  331. }
  332. return FALSE;
  333. }
  334. static gboolean
  335. rspamd_proxy_parse_mirror (rspamd_mempool_t *pool,
  336. const ucl_object_t *obj,
  337. gpointer ud,
  338. struct rspamd_rcl_section *section,
  339. GError **err)
  340. {
  341. const ucl_object_t *elt;
  342. struct rspamd_http_mirror *up = NULL;
  343. struct rspamd_proxy_ctx *ctx;
  344. struct rspamd_rcl_struct_parser *pd = ud;
  345. lua_State *L;
  346. ctx = pd->user_struct;
  347. L = ctx->lua_state;
  348. if (ucl_object_type (obj) != UCL_OBJECT) {
  349. g_set_error (err, rspamd_proxy_quark (), 100,
  350. "mirror option must be an object");
  351. return FALSE;
  352. }
  353. elt = ucl_object_lookup (obj, "name");
  354. if (elt == NULL) {
  355. g_set_error (err, rspamd_proxy_quark (), 100,
  356. "mirror option must have some name definition");
  357. return FALSE;
  358. }
  359. up = g_slice_alloc0 (sizeof (*up));
  360. up->name = g_strdup (ucl_object_tostring (elt));
  361. up->parser_to_ref = -1;
  362. up->parser_from_ref = -1;
  363. up->timeout = ctx->timeout;
  364. elt = ucl_object_lookup (obj, "key");
  365. if (elt != NULL) {
  366. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  367. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  368. if (up->key == NULL) {
  369. g_set_error (err, rspamd_proxy_quark (), 100,
  370. "cannot read mirror key");
  371. goto err;
  372. }
  373. }
  374. elt = ucl_object_lookup (obj, "hosts");
  375. if (elt == NULL) {
  376. g_set_error (err, rspamd_proxy_quark (), 100,
  377. "mirror option must have some hosts definition");
  378. goto err;
  379. }
  380. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  381. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  382. g_set_error (err, rspamd_proxy_quark (), 100,
  383. "mirror has bad hosts definition");
  384. goto err;
  385. }
  386. elt = ucl_object_lookup_any (obj, "probability", "prob", NULL);
  387. if (elt) {
  388. up->prob = ucl_object_todouble (elt);
  389. }
  390. else {
  391. up->prob = 1.0;
  392. }
  393. elt = ucl_object_lookup (obj, "local");
  394. if (elt && ucl_object_toboolean (elt)) {
  395. up->local = TRUE;
  396. }
  397. elt = ucl_object_lookup (obj, "timeout");
  398. if (elt) {
  399. ucl_object_todouble_safe (elt, &up->timeout);
  400. }
  401. /*
  402. * Accept lua function here in form
  403. * fun :: String -> UCL
  404. */
  405. elt = ucl_object_lookup (obj, "parser");
  406. if (elt) {
  407. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  408. &up->parser_to_ref, err)) {
  409. goto err;
  410. }
  411. }
  412. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  413. if (elt && ucl_object_type (elt) == UCL_STRING) {
  414. up->settings_id = g_strdup (ucl_object_tostring (elt));
  415. }
  416. double_to_tv (up->timeout, &up->io_tv);
  417. g_ptr_array_add (ctx->mirrors, up);
  418. return TRUE;
  419. err:
  420. if (up) {
  421. g_free (up->name);
  422. rspamd_upstreams_destroy (up->u);
  423. if (up->key) {
  424. rspamd_pubkey_unref (up->key);
  425. }
  426. if (up->parser_from_ref != -1) {
  427. luaL_unref (L, LUA_REGISTRYINDEX, up->parser_from_ref);
  428. }
  429. if (up->parser_to_ref != -1) {
  430. luaL_unref (L, LUA_REGISTRYINDEX, up->parser_to_ref);
  431. }
  432. g_slice_free1 (sizeof (*up), up);
  433. }
  434. return FALSE;
  435. }
  436. static gboolean
  437. rspamd_proxy_parse_script (rspamd_mempool_t *pool,
  438. const ucl_object_t *obj,
  439. gpointer ud,
  440. struct rspamd_rcl_section *section,
  441. GError **err)
  442. {
  443. struct rspamd_proxy_ctx *ctx;
  444. struct rspamd_rcl_struct_parser *pd = ud;
  445. lua_State *L;
  446. const gchar *lua_script;
  447. gsize slen;
  448. gint err_idx, ref_idx;
  449. GString *tb = NULL;
  450. struct stat st;
  451. ctx = pd->user_struct;
  452. L = ctx->lua_state;
  453. if (ucl_object_type (obj) != UCL_STRING) {
  454. g_set_error (err, rspamd_proxy_quark (), 100,
  455. "script option must be a string with file or lua chunk");
  456. return FALSE;
  457. }
  458. lua_script = ucl_object_tolstring (obj, &slen);
  459. lua_pushcfunction (L, &rspamd_lua_traceback);
  460. err_idx = lua_gettop (L);
  461. if (stat (lua_script, &st) != -1) {
  462. /* Load file */
  463. if (luaL_loadfile (L, lua_script) != 0) {
  464. g_set_error (err,
  465. rspamd_proxy_quark (),
  466. EINVAL,
  467. "cannot load lua parser script: %s",
  468. lua_tostring (L, -1));
  469. lua_settop (L, 0); /* Error function */
  470. goto err;
  471. }
  472. }
  473. else {
  474. /* Load data directly */
  475. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  476. g_set_error (err,
  477. rspamd_proxy_quark (),
  478. EINVAL,
  479. "cannot load lua parser script: %s",
  480. lua_tostring (L, -1));
  481. lua_settop (L, 0); /* Error function */
  482. goto err;
  483. }
  484. }
  485. /* Now do it */
  486. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  487. tb = lua_touserdata (L, -1);
  488. g_set_error (err,
  489. rspamd_proxy_quark (),
  490. EINVAL,
  491. "cannot init lua parser script: %s",
  492. tb->str);
  493. g_string_free (tb, TRUE);
  494. lua_settop (L, 0);
  495. goto err;
  496. }
  497. if (!lua_isfunction (L, -1)) {
  498. g_set_error (err,
  499. rspamd_proxy_quark (),
  500. EINVAL,
  501. "cannot init lua parser script: "
  502. "must return function, %s returned",
  503. lua_typename (L, lua_type (L, -1)));
  504. lua_settop (L, 0);
  505. goto err;
  506. }
  507. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  508. lua_settop (L, 0);
  509. g_array_append_val (ctx->cmp_refs, ref_idx);
  510. return TRUE;
  511. err:
  512. return FALSE;
  513. }
  514. gpointer
  515. init_rspamd_proxy (struct rspamd_config *cfg)
  516. {
  517. struct rspamd_proxy_ctx *ctx;
  518. GQuark type;
  519. type = g_quark_try_string ("rspamd_proxy");
  520. ctx = g_malloc0 (sizeof (struct rspamd_proxy_ctx));
  521. ctx->magic = rspamd_rspamd_proxy_magic;
  522. ctx->timeout = 10.0;
  523. ctx->upstreams = g_hash_table_new (rspamd_strcase_hash, rspamd_strcase_equal);
  524. ctx->mirrors = g_ptr_array_new ();
  525. ctx->rotate_tm = DEFAULT_ROTATION_TIME;
  526. ctx->cfg = cfg;
  527. ctx->lua_state = cfg->lua_state;
  528. ctx->cmp_refs = g_array_new (FALSE, FALSE, sizeof (gint));
  529. ctx->max_retries = DEFAULT_RETRIES;
  530. rspamd_rcl_register_worker_option (cfg,
  531. type,
  532. "timeout",
  533. rspamd_rcl_parse_struct_time,
  534. ctx,
  535. G_STRUCT_OFFSET (struct rspamd_proxy_ctx,
  536. timeout),
  537. RSPAMD_CL_FLAG_TIME_FLOAT,
  538. "IO timeout");
  539. rspamd_rcl_register_worker_option (cfg,
  540. type,
  541. "rotate",
  542. rspamd_rcl_parse_struct_time,
  543. ctx,
  544. G_STRUCT_OFFSET (struct rspamd_proxy_ctx,
  545. rotate_tm),
  546. RSPAMD_CL_FLAG_TIME_FLOAT,
  547. "Rotation keys time, default: "
  548. G_STRINGIFY (DEFAULT_ROTATION_TIME) " seconds");
  549. rspamd_rcl_register_worker_option (cfg,
  550. type,
  551. "keypair",
  552. rspamd_rcl_parse_struct_keypair,
  553. ctx,
  554. G_STRUCT_OFFSET (struct rspamd_proxy_ctx,
  555. key),
  556. 0,
  557. "Server's keypair");
  558. rspamd_rcl_register_worker_option (cfg,
  559. type,
  560. "upstream",
  561. rspamd_proxy_parse_upstream,
  562. ctx,
  563. 0,
  564. 0,
  565. "List of upstreams");
  566. rspamd_rcl_register_worker_option (cfg,
  567. type,
  568. "mirror",
  569. rspamd_proxy_parse_mirror,
  570. ctx,
  571. 0,
  572. RSPAMD_CL_FLAG_MULTIPLE,
  573. "List of mirrors");
  574. rspamd_rcl_register_worker_option (cfg,
  575. type,
  576. "script",
  577. rspamd_proxy_parse_script,
  578. ctx,
  579. 0,
  580. RSPAMD_CL_FLAG_MULTIPLE,
  581. "Compare script to be executed");
  582. rspamd_rcl_register_worker_option (cfg,
  583. type,
  584. "timeout",
  585. rspamd_rcl_parse_struct_integer,
  586. ctx,
  587. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, max_retries),
  588. RSPAMD_CL_FLAG_UINT,
  589. "Maximum number of retries for master connection");
  590. return ctx;
  591. }
  592. static void
  593. proxy_backend_close_connection (struct rspamd_proxy_backend_connection *conn)
  594. {
  595. if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  596. if (conn->backend_conn) {
  597. rspamd_http_connection_reset (conn->backend_conn);
  598. rspamd_http_connection_unref (conn->backend_conn);
  599. close (conn->backend_sock);
  600. }
  601. conn->flags |= RSPAMD_BACKEND_CLOSED;
  602. }
  603. }
  604. static gboolean
  605. proxy_backend_parse_results (struct rspamd_proxy_session *session,
  606. struct rspamd_proxy_backend_connection *conn,
  607. lua_State *L, gint parser_ref,
  608. const gchar *in, gsize inlen)
  609. {
  610. struct ucl_parser *parser;
  611. GString *tb = NULL;
  612. gint err_idx;
  613. if (inlen == 0 || in == NULL) {
  614. return FALSE;
  615. }
  616. if (parser_ref != -1) {
  617. /* Call parser function */
  618. lua_pushcfunction (L, &rspamd_lua_traceback);
  619. err_idx = lua_gettop (L);
  620. lua_rawgeti (L, LUA_REGISTRYINDEX, parser_ref);
  621. /* XXX: copies all data */
  622. lua_pushlstring (L, in, inlen);
  623. if (lua_pcall (L, 1, 1, err_idx) != 0) {
  624. tb = lua_touserdata (L, -1);
  625. msg_err_session (
  626. "cannot run lua parser script: %s",
  627. tb->str);
  628. g_string_free (tb, TRUE);
  629. lua_settop (L, 0);
  630. return FALSE;
  631. }
  632. conn->results = ucl_object_lua_import (L, -1);
  633. lua_settop (L, 0);
  634. }
  635. else {
  636. parser = ucl_parser_new (0);
  637. if (!ucl_parser_add_chunk (parser, in, inlen)) {
  638. msg_err_session ("cannot parse input: %s", ucl_parser_get_error (
  639. parser));
  640. ucl_parser_free (parser);
  641. return FALSE;
  642. }
  643. conn->results = ucl_parser_get_object (parser);
  644. ucl_parser_free (parser);
  645. }
  646. return TRUE;
  647. }
  648. static void
  649. proxy_call_cmp_script (struct rspamd_proxy_session *session, gint cbref)
  650. {
  651. GString *tb = NULL;
  652. gint err_idx;
  653. guint i;
  654. struct rspamd_proxy_backend_connection *conn;
  655. lua_State *L;
  656. L = session->ctx->lua_state;
  657. lua_pushcfunction (L, &rspamd_lua_traceback);
  658. err_idx = lua_gettop (L);
  659. lua_rawgeti (L, LUA_REGISTRYINDEX, cbref);
  660. lua_createtable (L, 0, session->mirror_conns->len + 1);
  661. /* Now push master results */
  662. if (session->master_conn && session->master_conn->results) {
  663. lua_pushstring (L, "master");
  664. ucl_object_push_lua (L, session->master_conn->results, true);
  665. lua_settable (L, -3);
  666. }
  667. else {
  668. lua_pushstring (L, "master");
  669. lua_pushstring (L, "no results");
  670. lua_settable (L, -3);
  671. }
  672. for (i = 0; i < session->mirror_conns->len; i ++) {
  673. conn = g_ptr_array_index (session->mirror_conns, i);
  674. if (conn->results) {
  675. lua_pushstring (L, conn->name);
  676. ucl_object_push_lua (L, conn->results, true);
  677. lua_settable (L, -3);
  678. }
  679. else {
  680. lua_pushstring (L, conn->name);
  681. lua_pushstring (L, conn->err ? conn->err : "unknown error");
  682. lua_settable (L, -3);
  683. }
  684. }
  685. if (lua_pcall (L, 1, 0, err_idx) != 0) {
  686. tb = lua_touserdata (L, -1);
  687. msg_err_session (
  688. "cannot run lua compare script: %s",
  689. tb->str);
  690. g_string_free (tb, TRUE);
  691. }
  692. lua_settop (L, 0);
  693. }
  694. static void
  695. proxy_session_dtor (struct rspamd_proxy_session *session)
  696. {
  697. guint i;
  698. gint cbref;
  699. struct rspamd_proxy_backend_connection *conn;
  700. for (i = 0; i < session->ctx->cmp_refs->len; i ++) {
  701. cbref = g_array_index (session->ctx->cmp_refs, gint, i);
  702. proxy_call_cmp_script (session, cbref);
  703. }
  704. if (session->master_conn) {
  705. proxy_backend_close_connection (session->master_conn);
  706. }
  707. if (session->map && session->map_len) {
  708. munmap (session->map, session->map_len);
  709. }
  710. if (session->client_conn) {
  711. rspamd_http_connection_reset (session->client_conn);
  712. rspamd_http_connection_unref (session->client_conn);
  713. }
  714. for (i = 0; i < session->mirror_conns->len; i ++) {
  715. conn = g_ptr_array_index (session->mirror_conns, i);
  716. if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  717. proxy_backend_close_connection (conn);
  718. }
  719. if (conn->results) {
  720. ucl_object_unref (conn->results);
  721. }
  722. }
  723. if (session->master_conn && session->master_conn->results) {
  724. ucl_object_unref (session->master_conn->results);
  725. }
  726. g_ptr_array_free (session->mirror_conns, TRUE);
  727. rspamd_http_message_shmem_unref (session->shmem_ref);
  728. rspamd_http_message_unref (session->client_message);
  729. rspamd_inet_address_destroy (session->client_addr);
  730. close (session->client_sock);
  731. rspamd_mempool_delete (session->pool);
  732. g_slice_free1 (sizeof (*session), session);
  733. }
  734. static gboolean
  735. proxy_check_file (struct rspamd_http_message *msg,
  736. struct rspamd_proxy_session *session)
  737. {
  738. const rspamd_ftok_t *tok, *key_tok;
  739. rspamd_ftok_t srch;
  740. gchar *file_str;
  741. GHashTable *query_args;
  742. GHashTableIter it;
  743. gpointer k, v;
  744. struct http_parser_url u;
  745. rspamd_fstring_t *new_url;
  746. tok = rspamd_http_message_find_header (msg, "File");
  747. if (tok) {
  748. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  749. session->map = rspamd_file_xmap (file_str, PROT_READ,
  750. &session->map_len);
  751. if (session->map == NULL) {
  752. msg_err_session ("cannot map %s: %s", file_str, strerror (errno));
  753. return FALSE;
  754. }
  755. /* Remove header after processing */
  756. rspamd_http_message_remove_header (msg, "File");
  757. session->fname = file_str;
  758. }
  759. else {
  760. /* Need to parse query URL */
  761. if (http_parser_parse_url (msg->url->str, msg->url->len, 0, &u) != 0) {
  762. msg_err_session ("bad request url: %V", msg->url);
  763. return FALSE;
  764. }
  765. if (u.field_set & (1 << UF_QUERY)) {
  766. /* In case if we have a query, we need to store it somewhere */
  767. query_args = rspamd_http_message_parse_query (msg);
  768. srch.begin = "File";
  769. srch.len = strlen ("File");
  770. tok = g_hash_table_lookup (query_args, &srch);
  771. if (tok) {
  772. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  773. session->map = rspamd_file_xmap (file_str, PROT_READ,
  774. &session->map_len);
  775. if (session->map == NULL) {
  776. msg_err_session ("cannot map %s: %s", file_str, strerror (errno));
  777. g_hash_table_unref (query_args);
  778. return FALSE;
  779. }
  780. /* We need to create a new URL with file attribute removed */
  781. new_url = rspamd_fstring_new_init (msg->url->str,
  782. u.field_data[UF_QUERY].off);
  783. new_url = rspamd_fstring_append (new_url, "?", 1);
  784. g_hash_table_iter_init (&it, query_args);
  785. while (g_hash_table_iter_next (&it, &k, &v)) {
  786. key_tok = k;
  787. tok = v;
  788. if (!rspamd_ftok_icase_equal (key_tok, &srch)) {
  789. rspamd_printf_fstring (&new_url, "%T=%T&",
  790. key_tok, tok);
  791. }
  792. }
  793. /* Erase last character (might be either & or ?) */
  794. rspamd_fstring_erase (new_url, new_url->len - 1, 1);
  795. rspamd_fstring_free (msg->url);
  796. msg->url = new_url;
  797. session->fname = file_str;
  798. }
  799. g_hash_table_unref (query_args);
  800. }
  801. }
  802. return TRUE;
  803. }
  804. static void
  805. proxy_backend_mirror_error_handler (struct rspamd_http_connection *conn, GError *err)
  806. {
  807. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  808. struct rspamd_proxy_session *session;
  809. session = bk_conn->s;
  810. msg_info_session ("abnormally closing connection from backend: %s:%s, "
  811. "error: %e",
  812. bk_conn->name,
  813. rspamd_inet_address_to_string (rspamd_upstream_addr (bk_conn->up)),
  814. err);
  815. if (err) {
  816. bk_conn->err = rspamd_mempool_strdup (session->pool, err->message);
  817. }
  818. rspamd_upstream_fail (bk_conn->up);
  819. proxy_backend_close_connection (bk_conn);
  820. REF_RELEASE (bk_conn->s);
  821. }
  822. static gint
  823. proxy_backend_mirror_finish_handler (struct rspamd_http_connection *conn,
  824. struct rspamd_http_message *msg)
  825. {
  826. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  827. struct rspamd_proxy_session *session;
  828. session = bk_conn->s;
  829. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  830. bk_conn->parser_from_ref, msg->body_buf.begin, msg->body_buf.len)) {
  831. msg_warn_session ("cannot parse results from the mirror backend %s:%s",
  832. bk_conn->name,
  833. rspamd_inet_address_to_string (rspamd_upstream_addr (bk_conn->up)));
  834. bk_conn->err = "cannot parse ucl";
  835. }
  836. msg_info_session ("finished mirror connection to %s", bk_conn->name);
  837. rspamd_upstream_ok (bk_conn->up);
  838. proxy_backend_close_connection (bk_conn);
  839. REF_RELEASE (bk_conn->s);
  840. return 0;
  841. }
  842. static void
  843. proxy_open_mirror_connections (struct rspamd_proxy_session *session)
  844. {
  845. gdouble coin;
  846. struct rspamd_http_mirror *m;
  847. guint i;
  848. struct rspamd_proxy_backend_connection *bk_conn;
  849. struct rspamd_http_message *msg;
  850. coin = rspamd_random_double ();
  851. for (i = 0; i < session->ctx->mirrors->len; i ++) {
  852. m = g_ptr_array_index (session->ctx->mirrors, i);
  853. if (m->prob < coin) {
  854. /* No luck */
  855. continue;
  856. }
  857. bk_conn = rspamd_mempool_alloc0 (session->pool,
  858. sizeof (*bk_conn));
  859. bk_conn->s = session;
  860. bk_conn->name = m->name;
  861. bk_conn->io_tv = &m->io_tv;
  862. bk_conn->up = rspamd_upstream_get (m->u,
  863. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  864. bk_conn->parser_from_ref = m->parser_from_ref;
  865. bk_conn->parser_to_ref = m->parser_to_ref;
  866. if (bk_conn->up == NULL) {
  867. msg_err_session ("cannot select upstream for %s", m->name);
  868. continue;
  869. }
  870. bk_conn->backend_sock = rspamd_inet_address_connect (
  871. rspamd_upstream_addr (bk_conn->up),
  872. SOCK_STREAM, TRUE);
  873. if (bk_conn->backend_sock == -1) {
  874. msg_err_session ("cannot connect upstream for %s", m->name);
  875. rspamd_upstream_fail (bk_conn->up);
  876. continue;
  877. }
  878. msg = rspamd_http_connection_copy_msg (session->client_message);
  879. if (msg == NULL) {
  880. msg_err_session ("cannot copy message to send to a mirror %s: %s",
  881. m->name, strerror (errno));
  882. continue;
  883. }
  884. msg->method = HTTP_GET;
  885. if (msg->url->len == 0) {
  886. msg->url = rspamd_fstring_append (msg->url, "/check", strlen ("/check"));
  887. }
  888. if (m->settings_id != NULL) {
  889. rspamd_http_message_remove_header (msg, "Settings-ID");
  890. rspamd_http_message_add_header (msg, "Settings-ID", m->settings_id);
  891. }
  892. bk_conn->backend_conn = rspamd_http_connection_new (NULL,
  893. proxy_backend_mirror_error_handler,
  894. proxy_backend_mirror_finish_handler,
  895. RSPAMD_HTTP_CLIENT_SIMPLE,
  896. RSPAMD_HTTP_CLIENT,
  897. session->ctx->keys_cache,
  898. NULL);
  899. rspamd_http_connection_set_key (bk_conn->backend_conn,
  900. session->ctx->local_key);
  901. msg->peer_key = rspamd_pubkey_ref (m->key);
  902. if (m->local ||
  903. rspamd_inet_address_is_local (rspamd_upstream_addr (bk_conn->up))) {
  904. if (session->fname) {
  905. rspamd_http_message_add_header (msg, "File", session->fname);
  906. }
  907. rspamd_http_connection_write_message_shared (bk_conn->backend_conn,
  908. msg, NULL, NULL, bk_conn,
  909. bk_conn->backend_sock,
  910. bk_conn->io_tv, session->ctx->ev_base);
  911. }
  912. else {
  913. if (session->fname) {
  914. rspamd_http_message_set_body (msg, session->map, session->map_len);
  915. }
  916. rspamd_http_connection_write_message (bk_conn->backend_conn,
  917. msg, NULL, NULL, bk_conn,
  918. bk_conn->backend_sock,
  919. bk_conn->io_tv, session->ctx->ev_base);
  920. }
  921. g_ptr_array_add (session->mirror_conns, bk_conn);
  922. REF_RETAIN (session);
  923. msg_info_session ("send request to %s", m->name);
  924. }
  925. }
  926. static void
  927. proxy_client_write_error (struct rspamd_proxy_session *session, gint code,
  928. const gchar *status)
  929. {
  930. struct rspamd_http_message *reply;
  931. reply = rspamd_http_new_message (HTTP_RESPONSE);
  932. reply->code = code;
  933. reply->status = rspamd_fstring_new_init (status, strlen (status));
  934. rspamd_http_connection_write_message (session->client_conn,
  935. reply, NULL, NULL, session, session->client_sock,
  936. &session->ctx->io_tv, session->ctx->ev_base);
  937. }
  938. static void
  939. proxy_backend_master_error_handler (struct rspamd_http_connection *conn, GError *err)
  940. {
  941. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  942. struct rspamd_proxy_session *session;
  943. session = bk_conn->s;
  944. msg_info_session ("abnormally closing connection from backend: %s, error: %s,"
  945. " retries left: %d",
  946. rspamd_inet_address_to_string (rspamd_upstream_addr (session->master_conn->up)),
  947. err->message,
  948. session->ctx->max_retries - session->retries);
  949. session->retries ++;
  950. rspamd_upstream_fail (bk_conn->up);
  951. proxy_backend_close_connection (session->master_conn);
  952. if (session->ctx->max_retries &&
  953. session->retries > session->ctx->max_retries) {
  954. msg_err_session ("cannot connect to upstream, maximum retries "
  955. "has been reached: %d", session->retries);
  956. /* Terminate session immediately */
  957. proxy_client_write_error (session, err->code, err->message);
  958. }
  959. else {
  960. if (!proxy_send_master_message (session)) {
  961. proxy_client_write_error (session, err->code, err->message);
  962. }
  963. else {
  964. msg_info_session ("retry connection to: %s"
  965. " retries left: %d",
  966. rspamd_inet_address_to_string (rspamd_upstream_addr (session->master_conn->up)),
  967. session->ctx->max_retries - session->retries);
  968. }
  969. }
  970. }
  971. static gint
  972. proxy_backend_master_finish_handler (struct rspamd_http_connection *conn,
  973. struct rspamd_http_message *msg)
  974. {
  975. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  976. struct rspamd_proxy_session *session;
  977. rspamd_fstring_t *reply;
  978. session = bk_conn->s;
  979. rspamd_http_connection_steal_msg (session->master_conn->backend_conn);
  980. rspamd_http_message_remove_header (msg, "Content-Length");
  981. rspamd_http_message_remove_header (msg, "Key");
  982. rspamd_http_connection_reset (session->master_conn->backend_conn);
  983. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  984. bk_conn->parser_from_ref, msg->body_buf.begin, msg->body_buf.len)) {
  985. msg_warn_session ("cannot parse results from the master backend");
  986. }
  987. if (session->is_spamc) {
  988. /* We need to reformat ucl to fit with legacy spamc protocol */
  989. if (bk_conn->results) {
  990. reply = rspamd_fstring_new ();
  991. rspamd_ucl_torspamc_output (bk_conn->results, &reply);
  992. rspamd_http_message_set_body_from_fstring_steal (msg, reply);
  993. msg->method = HTTP_SYMBOLS;
  994. }
  995. else {
  996. msg_warn_session ("cannot parse results from the master backend, "
  997. "return them as is");
  998. }
  999. }
  1000. rspamd_upstream_ok (bk_conn->up);
  1001. rspamd_http_connection_write_message (session->client_conn,
  1002. msg, NULL, NULL, session, session->client_sock,
  1003. bk_conn->io_tv, session->ctx->ev_base);
  1004. return 0;
  1005. }
  1006. static gboolean
  1007. proxy_send_master_message (struct rspamd_proxy_session *session)
  1008. {
  1009. struct rspamd_http_message *msg;
  1010. struct rspamd_http_upstream *backend = NULL;
  1011. const rspamd_ftok_t *host;
  1012. gchar hostbuf[512];
  1013. host = rspamd_http_message_find_header (session->client_message, "Host");
  1014. if (host == NULL) {
  1015. backend = session->ctx->default_upstream;
  1016. }
  1017. else {
  1018. rspamd_strlcpy (hostbuf, host->begin, MIN(host->len + 1, sizeof (hostbuf)));
  1019. backend = g_hash_table_lookup (session->ctx->upstreams, hostbuf);
  1020. if (backend == NULL) {
  1021. backend = session->ctx->default_upstream;
  1022. }
  1023. }
  1024. if (backend == NULL) {
  1025. /* No backend */
  1026. msg_err_session ("cannot find upstream for %s", host ? hostbuf : "default");
  1027. goto err;
  1028. }
  1029. else {
  1030. retry:
  1031. if (session->ctx->max_retries &&
  1032. session->retries > session->ctx->max_retries) {
  1033. msg_err_session ("cannot connect to upstream, maximum retries "
  1034. "has been reached: %d", session->retries);
  1035. goto err;
  1036. }
  1037. session->master_conn->up = rspamd_upstream_get (backend->u,
  1038. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1039. session->master_conn->io_tv = &backend->io_tv;
  1040. if (session->master_conn->up == NULL) {
  1041. msg_err_session ("cannot select upstream for %s",
  1042. host ? hostbuf : "default");
  1043. goto err;
  1044. }
  1045. session->master_conn->backend_sock = rspamd_inet_address_connect (
  1046. rspamd_upstream_addr (session->master_conn->up),
  1047. SOCK_STREAM, TRUE);
  1048. if (session->master_conn->backend_sock == -1) {
  1049. msg_err_session ("cannot connect upstream: %s(%s)",
  1050. host ? hostbuf : "default",
  1051. rspamd_inet_address_to_string (rspamd_upstream_addr (
  1052. session->master_conn->up)));
  1053. rspamd_upstream_fail (session->master_conn->up);
  1054. session->retries ++;
  1055. goto retry;
  1056. }
  1057. session->master_conn->backend_conn = rspamd_http_connection_new (
  1058. NULL,
  1059. proxy_backend_master_error_handler,
  1060. proxy_backend_master_finish_handler,
  1061. RSPAMD_HTTP_CLIENT_SIMPLE,
  1062. RSPAMD_HTTP_CLIENT,
  1063. session->ctx->keys_cache,
  1064. NULL);
  1065. session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED;
  1066. session->master_conn->parser_from_ref = backend->parser_from_ref;
  1067. session->master_conn->parser_to_ref = backend->parser_to_ref;
  1068. msg = rspamd_http_connection_copy_msg (session->client_message);
  1069. rspamd_http_connection_set_key (session->master_conn->backend_conn,
  1070. session->ctx->local_key);
  1071. msg->peer_key = rspamd_pubkey_ref (backend->key);
  1072. if (backend->local ||
  1073. rspamd_inet_address_is_local (
  1074. rspamd_upstream_addr (session->master_conn->up))) {
  1075. if (session->fname) {
  1076. rspamd_http_message_add_header (msg, "File", session->fname);
  1077. }
  1078. rspamd_http_connection_write_message_shared (
  1079. session->master_conn->backend_conn,
  1080. msg, NULL, NULL, session->master_conn,
  1081. session->master_conn->backend_sock,
  1082. session->master_conn->io_tv, session->ctx->ev_base);
  1083. }
  1084. else {
  1085. if (session->fname) {
  1086. rspamd_http_message_set_body (msg, session->map, session->map_len);
  1087. }
  1088. rspamd_http_connection_write_message (
  1089. session->master_conn->backend_conn,
  1090. msg, NULL, NULL, session->master_conn,
  1091. session->master_conn->backend_sock,
  1092. session->master_conn->io_tv, session->ctx->ev_base);
  1093. }
  1094. }
  1095. return TRUE;
  1096. err:
  1097. rspamd_http_connection_steal_msg (session->client_conn);
  1098. rspamd_http_connection_reset (session->client_conn);
  1099. proxy_client_write_error (session, 404, "Backend not found");
  1100. return FALSE;
  1101. }
  1102. static void
  1103. proxy_client_error_handler (struct rspamd_http_connection *conn, GError *err)
  1104. {
  1105. struct rspamd_proxy_session *session = conn->ud;
  1106. msg_info_session ("abnormally closing connection from: %s, error: %s",
  1107. rspamd_inet_address_to_string (session->client_addr), err->message);
  1108. /* Terminate session immediately */
  1109. proxy_backend_close_connection (session->master_conn);
  1110. REF_RELEASE (session);
  1111. }
  1112. static gint
  1113. proxy_client_finish_handler (struct rspamd_http_connection *conn,
  1114. struct rspamd_http_message *msg)
  1115. {
  1116. struct rspamd_proxy_session *session = conn->ud;
  1117. if (!session->master_conn) {
  1118. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1119. sizeof (*session->master_conn));
  1120. session->master_conn->s = session;
  1121. session->master_conn->name = "master";
  1122. /* Reset spamc legacy */
  1123. if (msg->method >= HTTP_SYMBOLS) {
  1124. msg->method = HTTP_GET;
  1125. session->is_spamc = TRUE;
  1126. msg_info_session ("enabling legacy rspamc mode for session");
  1127. }
  1128. if (msg->url->len == 0) {
  1129. msg->url = rspamd_fstring_append (msg->url, "/check", strlen ("/check"));
  1130. }
  1131. if (!proxy_check_file (msg, session)) {
  1132. goto err;
  1133. }
  1134. session->client_message = rspamd_http_connection_steal_msg (
  1135. session->client_conn);
  1136. session->shmem_ref = rspamd_http_message_shmem_ref (session->client_message);
  1137. rspamd_http_message_remove_header (msg, "Content-Length");
  1138. rspamd_http_message_remove_header (msg, "Key");
  1139. proxy_open_mirror_connections (session);
  1140. rspamd_http_connection_reset (session->client_conn);
  1141. proxy_send_master_message (session);
  1142. }
  1143. else {
  1144. msg_info_session ("finished master connection");
  1145. proxy_backend_close_connection (session->master_conn);
  1146. REF_RELEASE (session);
  1147. }
  1148. return 0;
  1149. err:
  1150. rspamd_http_connection_steal_msg (session->client_conn);
  1151. rspamd_http_message_remove_header (msg, "Content-Length");
  1152. rspamd_http_message_remove_header (msg, "Key");
  1153. rspamd_http_connection_reset (session->client_conn);
  1154. proxy_client_write_error (session, 404, "Backend not found");
  1155. return 0;
  1156. }
  1157. static void
  1158. proxy_accept_socket (gint fd, short what, void *arg)
  1159. {
  1160. struct rspamd_worker *worker = (struct rspamd_worker *) arg;
  1161. struct rspamd_proxy_ctx *ctx;
  1162. rspamd_inet_addr_t *addr;
  1163. struct rspamd_proxy_session *session;
  1164. gint nfd;
  1165. ctx = worker->ctx;
  1166. if ((nfd =
  1167. rspamd_accept_from_socket (fd, &addr, worker->accept_events)) == -1) {
  1168. msg_warn ("accept failed: %s", strerror (errno));
  1169. return;
  1170. }
  1171. /* Check for EAGAIN */
  1172. if (nfd == 0) {
  1173. return;
  1174. }
  1175. session = g_slice_alloc0 (sizeof (*session));
  1176. REF_INIT_RETAIN (session, proxy_session_dtor);
  1177. session->client_sock = nfd;
  1178. session->client_addr = addr;
  1179. session->mirror_conns = g_ptr_array_sized_new (ctx->mirrors->len);
  1180. session->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (), "proxy");
  1181. session->client_conn = rspamd_http_connection_new (NULL,
  1182. proxy_client_error_handler,
  1183. proxy_client_finish_handler,
  1184. 0,
  1185. RSPAMD_HTTP_SERVER,
  1186. ctx->keys_cache,
  1187. NULL);
  1188. session->ctx = ctx;
  1189. if (ctx->key) {
  1190. rspamd_http_connection_set_key (session->client_conn, ctx->key);
  1191. }
  1192. msg_info_session ("accepted connection from %s port %d",
  1193. rspamd_inet_address_to_string (addr),
  1194. rspamd_inet_address_get_port (addr));
  1195. rspamd_http_connection_read_message_shared (session->client_conn,
  1196. session,
  1197. nfd,
  1198. &ctx->io_tv,
  1199. ctx->ev_base);
  1200. }
  1201. static void
  1202. proxy_rotate_key (gint fd, short what, void *arg)
  1203. {
  1204. struct timeval rot_tv;
  1205. struct rspamd_proxy_ctx *ctx = arg;
  1206. gpointer kp;
  1207. double_to_tv (ctx->rotate_tm, &rot_tv);
  1208. rot_tv.tv_sec += ottery_rand_range (rot_tv.tv_sec);
  1209. event_del (&ctx->rotate_ev);
  1210. event_add (&ctx->rotate_ev, &rot_tv);
  1211. kp = ctx->local_key;
  1212. ctx->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
  1213. RSPAMD_CRYPTOBOX_MODE_25519);
  1214. rspamd_keypair_unref (kp);
  1215. }
  1216. void
  1217. start_rspamd_proxy (struct rspamd_worker *worker)
  1218. {
  1219. struct rspamd_proxy_ctx *ctx = worker->ctx;
  1220. struct timeval rot_tv;
  1221. ctx->cfg = worker->srv->cfg;
  1222. REF_RETAIN (ctx->cfg);
  1223. ctx->ev_base = rspamd_prepare_worker (worker, "rspamd_proxy",
  1224. proxy_accept_socket,
  1225. TRUE);
  1226. ctx->resolver = dns_resolver_init (worker->srv->logger,
  1227. ctx->ev_base,
  1228. worker->srv->cfg);
  1229. double_to_tv (ctx->timeout, &ctx->io_tv);
  1230. rspamd_map_watch (worker->srv->cfg, ctx->ev_base, ctx->resolver);
  1231. rspamd_upstreams_library_config (worker->srv->cfg, ctx->cfg->ups_ctx,
  1232. ctx->ev_base, ctx->resolver->r);
  1233. /* XXX: stupid default */
  1234. ctx->keys_cache = rspamd_keypair_cache_new (256);
  1235. ctx->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
  1236. RSPAMD_CRYPTOBOX_MODE_25519);
  1237. double_to_tv (ctx->rotate_tm, &rot_tv);
  1238. rot_tv.tv_sec += ottery_rand_range (rot_tv.tv_sec);
  1239. event_set (&ctx->rotate_ev, -1, EV_TIMEOUT, proxy_rotate_key, ctx);
  1240. event_base_set (ctx->ev_base, &ctx->rotate_ev);
  1241. event_add (&ctx->rotate_ev, &rot_tv);
  1242. event_base_loop (ctx->ev_base, 0);
  1243. rspamd_worker_block_signals ();
  1244. g_mime_shutdown ();
  1245. rspamd_log_close (worker->srv->logger);
  1246. if (ctx->key) {
  1247. rspamd_keypair_unref (ctx->key);
  1248. }
  1249. rspamd_keypair_cache_destroy (ctx->keys_cache);
  1250. REF_RELEASE (ctx->cfg);
  1251. exit (EXIT_SUCCESS);
  1252. }