You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

milter.c 50KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969
  1. /*-
  2. * Copyright 2017 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "milter.h"
  18. #include "milter_internal.h"
  19. #include "email_addr.h"
  20. #include "addr.h"
  21. #include "unix-std.h"
  22. #include "logger.h"
  23. #include "ottery.h"
  24. #include "libutil/http.h"
  25. #include "libutil/http_private.h"
  26. #include "libserver/protocol_internal.h"
  27. #include "libmime/filter.h"
  28. #include "libserver/worker_util.h"
  29. #include "utlist.h"
  30. #define msg_err_milter(...) rspamd_default_log_function(G_LOG_LEVEL_CRITICAL, \
  31. "milter", priv->pool->tag.uid, \
  32. G_STRFUNC, \
  33. __VA_ARGS__)
  34. #define msg_warn_milter(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  35. "milter", priv->pool->tag.uid, \
  36. G_STRFUNC, \
  37. __VA_ARGS__)
  38. #define msg_info_milter(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  39. "milter", priv->pool->tag.uid, \
  40. G_STRFUNC, \
  41. __VA_ARGS__)
  42. #define msg_debug_milter(...) rspamd_conditional_debug_fast (NULL, NULL, \
  43. rspamd_milter_log_id, "milter", priv->pool->tag.uid, \
  44. G_STRFUNC, \
  45. __VA_ARGS__)
  46. INIT_LOG_MODULE(milter)
  47. static const struct rspamd_milter_context *milter_ctx = NULL;
  48. static gboolean rspamd_milter_handle_session (
  49. struct rspamd_milter_session *session,
  50. struct rspamd_milter_private *priv);
  51. static GQuark
  52. rspamd_milter_quark (void)
  53. {
  54. return g_quark_from_static_string ("milter");
  55. }
  56. static void
  57. rspamd_milter_obuf_free (struct rspamd_milter_outbuf *obuf)
  58. {
  59. if (obuf) {
  60. if (obuf->buf) {
  61. rspamd_fstring_free (obuf->buf);
  62. }
  63. g_free (obuf);
  64. }
  65. }
  66. #define RSPAMD_MILTER_RESET_COMMON (1 << 0)
  67. #define RSPAMD_MILTER_RESET_IO (1 << 1)
  68. #define RSPAMD_MILTER_RESET_ADDR (1 << 2)
  69. #define RSPAMD_MILTER_RESET_MACRO (1 << 3)
  70. #define RSPAMD_MILTER_RESET_ALL (RSPAMD_MILTER_RESET_COMMON | \
  71. RSPAMD_MILTER_RESET_IO | \
  72. RSPAMD_MILTER_RESET_ADDR | \
  73. RSPAMD_MILTER_RESET_MACRO)
  74. #define RSPAMD_MILTER_RESET_QUIT_NC (RSPAMD_MILTER_RESET_COMMON | \
  75. RSPAMD_MILTER_RESET_ADDR | \
  76. RSPAMD_MILTER_RESET_MACRO)
  77. #define RSPAMD_MILTER_RESET_ABORT (RSPAMD_MILTER_RESET_COMMON)
  78. static void
  79. rspamd_milter_session_reset (struct rspamd_milter_session *session,
  80. guint how)
  81. {
  82. struct rspamd_milter_outbuf *obuf, *obuf_tmp;
  83. struct rspamd_milter_private *priv = session->priv;
  84. struct rspamd_email_address *cur;
  85. guint i;
  86. if (how & RSPAMD_MILTER_RESET_IO) {
  87. msg_debug_milter ("cleanup IO on abort");
  88. DL_FOREACH_SAFE (priv->out_chain, obuf, obuf_tmp) {
  89. rspamd_milter_obuf_free (obuf);
  90. }
  91. priv->out_chain = NULL;
  92. if (priv->parser.buf) {
  93. priv->parser.buf->len = 0;
  94. }
  95. }
  96. if (how & RSPAMD_MILTER_RESET_COMMON) {
  97. msg_debug_milter ("cleanup common data on abort");
  98. if (session->message) {
  99. session->message->len = 0;
  100. msg_debug_milter ("cleanup message on abort");
  101. }
  102. if (session->rcpts) {
  103. PTR_ARRAY_FOREACH (session->rcpts, i, cur) {
  104. rspamd_email_address_free (cur);
  105. }
  106. msg_debug_milter ("cleanup %d recipients on abort",
  107. (gint)session->rcpts->len);
  108. g_ptr_array_free (session->rcpts, TRUE);
  109. session->rcpts = NULL;
  110. }
  111. if (session->from) {
  112. msg_debug_milter ("cleanup from");
  113. rspamd_email_address_free (session->from);
  114. session->from = NULL;
  115. }
  116. if (session->helo) {
  117. msg_debug_milter ("cleanup helo");
  118. session->helo->len = 0;
  119. }
  120. if (priv->headers) {
  121. msg_debug_milter ("cleanup headers");
  122. gchar *k;
  123. GArray *ar;
  124. kh_foreach (priv->headers, k, ar, {
  125. g_free (k);
  126. g_array_free (ar, TRUE);
  127. });
  128. kh_clear (milter_headers_hash_t, priv->headers);
  129. }
  130. priv->cur_hdr = 0;
  131. }
  132. if (how & RSPAMD_MILTER_RESET_ADDR) {
  133. if (session->addr) {
  134. msg_debug_milter ("cleanup addr");
  135. rspamd_inet_address_free (session->addr);
  136. session->addr = NULL;
  137. }
  138. if (session->hostname) {
  139. msg_debug_milter ("cleanup hostname");
  140. session->hostname->len = 0;
  141. }
  142. }
  143. if (how & RSPAMD_MILTER_RESET_MACRO) {
  144. if (session->macros) {
  145. msg_debug_milter ("cleanup macros");
  146. g_hash_table_unref (session->macros);
  147. session->macros = NULL;
  148. }
  149. }
  150. }
  151. static void
  152. rspamd_milter_session_dtor (struct rspamd_milter_session *session)
  153. {
  154. struct rspamd_milter_private *priv;
  155. if (session) {
  156. priv = session->priv;
  157. msg_debug_milter ("destroying milter session");
  158. if (rspamd_event_pending (&priv->ev, EV_TIMEOUT|EV_WRITE|EV_READ)) {
  159. event_del (&priv->ev);
  160. }
  161. rspamd_milter_session_reset (session, RSPAMD_MILTER_RESET_ALL);
  162. if (priv->parser.buf) {
  163. rspamd_fstring_free (priv->parser.buf);
  164. }
  165. if (session->message) {
  166. rspamd_fstring_free (session->message);
  167. }
  168. if (session->helo) {
  169. rspamd_fstring_free (session->helo);
  170. }
  171. if (session->hostname) {
  172. rspamd_fstring_free (session->hostname);
  173. }
  174. if (priv->headers) {
  175. gchar *k;
  176. GArray *ar;
  177. kh_foreach (priv->headers, k, ar, {
  178. g_free (k);
  179. g_array_free (ar, TRUE);
  180. });
  181. kh_destroy (milter_headers_hash_t, priv->headers);
  182. }
  183. if (milter_ctx->sessions_cache) {
  184. rspamd_worker_session_cache_remove (milter_ctx->sessions_cache,
  185. session);
  186. }
  187. rspamd_mempool_delete (priv->pool);
  188. g_free (priv);
  189. g_free (session);
  190. }
  191. }
  192. static void
  193. rspamd_milter_on_protocol_error (struct rspamd_milter_session *session,
  194. struct rspamd_milter_private *priv, GError *err)
  195. {
  196. priv->state = RSPAMD_MILTER_WANNA_DIE;
  197. REF_RETAIN (session);
  198. priv->err_cb (priv->fd, session, priv->ud, err);
  199. REF_RELEASE (session);
  200. g_error_free (err);
  201. }
  202. static void
  203. rspamd_milter_io_handler (gint fd, gshort what, void *ud)
  204. {
  205. struct rspamd_milter_session *session = ud;
  206. struct rspamd_milter_private *priv;
  207. GError *err;
  208. priv = session->priv;
  209. if (what == EV_TIMEOUT) {
  210. msg_debug_milter ("connection timed out");
  211. err = g_error_new (rspamd_milter_quark (), ETIMEDOUT, "connection "
  212. "timed out");
  213. rspamd_milter_on_protocol_error (session, priv, err);
  214. }
  215. else {
  216. rspamd_milter_handle_session (session, priv);
  217. }
  218. }
  219. static inline void
  220. rspamd_milter_plan_io (struct rspamd_milter_session *session,
  221. struct rspamd_milter_private *priv, gshort what)
  222. {
  223. if (rspamd_event_pending (&priv->ev, EV_TIMEOUT|EV_WRITE|EV_READ)) {
  224. event_del (&priv->ev);
  225. }
  226. event_set (&priv->ev, priv->fd, what, rspamd_milter_io_handler,
  227. session);
  228. event_base_set (priv->ev_base, &priv->ev);
  229. event_add (&priv->ev, priv->ptv);
  230. }
  231. #define READ_INT_32(pos, var) do { \
  232. memcpy (&(var), (pos), sizeof (var)); \
  233. (pos) += sizeof (var); \
  234. (var) = ntohl (var); \
  235. } while (0)
  236. #define READ_INT_16(pos, var) do { \
  237. memcpy (&(var), (pos), sizeof (var)); \
  238. (pos) += sizeof (var); \
  239. (var) = ntohs (var); \
  240. } while (0)
  241. static gboolean
  242. rspamd_milter_process_command (struct rspamd_milter_session *session,
  243. struct rspamd_milter_private *priv)
  244. {
  245. GError *err;
  246. rspamd_fstring_t *buf;
  247. const guchar *pos, *end, *zero;
  248. guint cmdlen;
  249. guint32 version, actions, protocol;
  250. buf = priv->parser.buf;
  251. pos = buf->str + priv->parser.cmd_start;
  252. cmdlen = priv->parser.datalen;
  253. end = pos + cmdlen;
  254. switch (priv->parser.cur_cmd) {
  255. case RSPAMD_MILTER_CMD_ABORT:
  256. msg_debug_milter ("got abort command");
  257. rspamd_milter_session_reset (session, RSPAMD_MILTER_RESET_ABORT);
  258. break;
  259. case RSPAMD_MILTER_CMD_BODY:
  260. if (!session->message) {
  261. session->message = rspamd_fstring_sized_new (
  262. RSPAMD_MILTER_MESSAGE_CHUNK);
  263. }
  264. msg_debug_milter ("got body chunk: %d bytes", (int)cmdlen);
  265. session->message = rspamd_fstring_append (session->message,
  266. pos, cmdlen);
  267. break;
  268. case RSPAMD_MILTER_CMD_CONNECT:
  269. msg_debug_milter ("got connect command");
  270. /*
  271. * char hostname[]: Hostname, NUL terminated
  272. * char family: Protocol family
  273. * uint16 port: Port number (SMFIA_INET or SMFIA_INET6 only)
  274. * char address[]: IP address (ASCII) or unix socket path, NUL terminated
  275. */
  276. zero = memchr (pos, '\0', cmdlen);
  277. if (zero == NULL || zero > (end - sizeof (guint16) + 1)) {
  278. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  279. "connect command (no name)");
  280. rspamd_milter_on_protocol_error (session, priv, err);
  281. return FALSE;
  282. }
  283. else {
  284. guchar proto;
  285. guint16 port;
  286. gchar ip6_str[INET6_ADDRSTRLEN + 3];
  287. gsize r;
  288. /*
  289. * Important notice: Postfix do NOT use this command to pass
  290. * client's info (e.g. hostname is not really here)
  291. * Sendmail will pass it here
  292. */
  293. if (session->hostname == NULL) {
  294. session->hostname = rspamd_fstring_new_init (pos, zero - pos);
  295. msg_debug_milter ("got hostname on connect phase: %V",
  296. session->hostname);
  297. }
  298. else {
  299. session->hostname = rspamd_fstring_assign (session->hostname,
  300. pos, zero - pos);
  301. msg_debug_milter ("rewrote hostname on connect phase: %V",
  302. session->hostname);
  303. }
  304. pos = zero + 1;
  305. proto = *pos ++;
  306. if (proto == RSPAMD_MILTER_CONN_UNKNOWN) {
  307. /* We have no information about host */
  308. msg_debug_milter ("unknown connect address");
  309. }
  310. else {
  311. READ_INT_16 (pos, port);
  312. if (pos >= end) {
  313. /* No IP somehow */
  314. msg_debug_milter ("unknown connect IP/socket");
  315. }
  316. else {
  317. zero = memchr (pos, '\0', end - pos);
  318. if (zero == NULL) {
  319. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  320. "connect command (no zero terminated IP)");
  321. rspamd_milter_on_protocol_error (session, priv, err);
  322. return FALSE;
  323. }
  324. switch (proto) {
  325. case RSPAMD_MILTER_CONN_UNIX:
  326. session->addr = rspamd_inet_address_new (AF_UNIX,
  327. pos);
  328. break;
  329. case RSPAMD_MILTER_CONN_INET:
  330. session->addr = rspamd_inet_address_new (AF_INET, NULL);
  331. if (!rspamd_parse_inet_address_ip (pos, zero - pos,
  332. session->addr)) {
  333. err = g_error_new (rspamd_milter_quark (), EINVAL,
  334. "invalid connect command (bad IPv4)");
  335. rspamd_milter_on_protocol_error (session, priv,
  336. err);
  337. return FALSE;
  338. }
  339. rspamd_inet_address_set_port (session->addr, port);
  340. break;
  341. case RSPAMD_MILTER_CONN_INET6:
  342. session->addr = rspamd_inet_address_new (AF_INET6, NULL);
  343. if (zero - pos > sizeof ("IPv6:") &&
  344. rspamd_lc_cmp (pos, "IPv6:",
  345. sizeof ("IPv6:") - 1) == 0) {
  346. /* Kill sendmail please */
  347. pos += sizeof ("IPv6:") - 1;
  348. if (*pos != '[') {
  349. /* Add explicit braces */
  350. r = rspamd_snprintf (ip6_str, sizeof (ip6_str),
  351. "[%*s]", (int)(zero - pos), pos);
  352. }
  353. else {
  354. r = rspamd_strlcpy (ip6_str, pos, sizeof (ip6_str));
  355. }
  356. }
  357. else {
  358. r = rspamd_strlcpy (ip6_str, pos, sizeof (ip6_str));
  359. }
  360. if (!rspamd_parse_inet_address_ip (ip6_str, r,
  361. session->addr)) {
  362. err = g_error_new (rspamd_milter_quark (), EINVAL,
  363. "invalid connect command (bad IPv6)");
  364. rspamd_milter_on_protocol_error (session, priv,
  365. err);
  366. return FALSE;
  367. }
  368. rspamd_inet_address_set_port (session->addr, port);
  369. break;
  370. default:
  371. err = g_error_new (rspamd_milter_quark (), EINVAL,
  372. "invalid connect command (bad protocol: %c)",
  373. proto);
  374. rspamd_milter_on_protocol_error (session, priv,
  375. err);
  376. return FALSE;
  377. }
  378. }
  379. }
  380. msg_info_milter ("got connection from %s",
  381. rspamd_inet_address_to_string_pretty (session->addr));
  382. }
  383. break;
  384. case RSPAMD_MILTER_CMD_MACRO:
  385. msg_debug_milter ("got macro command");
  386. /*
  387. * Format is
  388. * 1 byte - command associated (we don't care about it)
  389. * 0-terminated name
  390. * 0-terminated value
  391. * ...
  392. */
  393. if (session->macros == NULL) {
  394. session->macros = g_hash_table_new_full (rspamd_ftok_icase_hash,
  395. rspamd_ftok_icase_equal,
  396. rspamd_fstring_mapped_ftok_free,
  397. rspamd_fstring_mapped_ftok_free);
  398. }
  399. /* Ignore one byte */
  400. pos ++;
  401. while (pos < end) {
  402. zero = memchr (pos, '\0', cmdlen);
  403. if (zero == NULL || zero >= end) {
  404. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  405. "macro command (no name)");
  406. rspamd_milter_on_protocol_error (session, priv, err);
  407. return FALSE;
  408. }
  409. else {
  410. rspamd_fstring_t *name, *value;
  411. rspamd_ftok_t *name_tok, *value_tok;
  412. const guchar *zero_val;
  413. zero_val = memchr (zero + 1, '\0', end - zero - 1);
  414. if (zero_val != NULL && end > zero_val) {
  415. name = rspamd_fstring_new_init (pos, zero - pos);
  416. value = rspamd_fstring_new_init (zero + 1,
  417. zero_val - zero - 1);
  418. name_tok = rspamd_ftok_map (name);
  419. value_tok = rspamd_ftok_map (value);
  420. g_hash_table_replace (session->macros, name_tok, value_tok);
  421. msg_debug_milter ("got macro: %T -> %T",
  422. name_tok, value_tok);
  423. cmdlen -= zero_val - pos;
  424. pos = zero_val + 1;
  425. }
  426. else {
  427. err = g_error_new (rspamd_milter_quark (), EINVAL,
  428. "invalid macro command (bad value)");
  429. rspamd_milter_on_protocol_error (session, priv, err);
  430. return FALSE;
  431. }
  432. }
  433. }
  434. break;
  435. case RSPAMD_MILTER_CMD_BODYEOB:
  436. msg_debug_milter ("got eob command");
  437. REF_RETAIN (session);
  438. priv->fin_cb (priv->fd, session, priv->ud);
  439. REF_RELEASE (session);
  440. break;
  441. case RSPAMD_MILTER_CMD_HELO:
  442. msg_debug_milter ("got helo command");
  443. if (end > pos && *(end - 1) == '\0') {
  444. if (session->helo == NULL) {
  445. session->helo = rspamd_fstring_new_init (pos, cmdlen - 1);
  446. }
  447. else {
  448. session->helo = rspamd_fstring_assign (session->helo,
  449. pos, cmdlen - 1);
  450. }
  451. }
  452. else if (end > pos) {
  453. /* Should not happen */
  454. if (session->helo == NULL) {
  455. session->helo = rspamd_fstring_new_init (pos, cmdlen);
  456. }
  457. else {
  458. session->helo = rspamd_fstring_assign (session->helo,
  459. pos, cmdlen);
  460. }
  461. }
  462. msg_debug_milter ("got helo value: %V", session->helo);
  463. break;
  464. case RSPAMD_MILTER_CMD_QUIT_NC:
  465. /* We need to reset session and start over */
  466. msg_debug_milter ("got quit_nc command");
  467. rspamd_milter_session_reset (session, RSPAMD_MILTER_RESET_QUIT_NC);
  468. break;
  469. case RSPAMD_MILTER_CMD_HEADER:
  470. msg_debug_milter ("got header command");
  471. if (!session->message) {
  472. session->message = rspamd_fstring_sized_new (
  473. RSPAMD_MILTER_MESSAGE_CHUNK);
  474. }
  475. zero = memchr (pos, '\0', cmdlen);
  476. if (zero == NULL) {
  477. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  478. "header command (no name)");
  479. rspamd_milter_on_protocol_error (session, priv, err);
  480. return FALSE;
  481. }
  482. else {
  483. if (end > zero && *(end - 1) == '\0') {
  484. khiter_t k;
  485. gint res;
  486. k = kh_get (milter_headers_hash_t, priv->headers, (gchar *)pos);
  487. if (k == kh_end (priv->headers)) {
  488. GArray *ar;
  489. k = kh_put (milter_headers_hash_t, priv->headers,
  490. g_strdup (pos), &res);
  491. ar = g_array_new (FALSE, FALSE, sizeof (gint));
  492. g_array_append_val (ar, priv->cur_hdr);
  493. kh_value (priv->headers, k) = ar;
  494. }
  495. else {
  496. g_array_append_val (kh_value (priv->headers, k),
  497. priv->cur_hdr);
  498. }
  499. rspamd_printf_fstring (&session->message, "%*s: %*s\r\n",
  500. (int)(zero - pos), pos,
  501. (int)(end - zero - 2), zero + 1);
  502. priv->cur_hdr ++;
  503. }
  504. else {
  505. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  506. "header command (bad value)");
  507. rspamd_milter_on_protocol_error (session, priv, err);
  508. return FALSE;
  509. }
  510. }
  511. break;
  512. case RSPAMD_MILTER_CMD_MAIL:
  513. msg_debug_milter ("mail command");
  514. while (pos < end) {
  515. struct rspamd_email_address *addr;
  516. gchar *cpy;
  517. zero = memchr (pos, '\0', end - pos);
  518. if (zero && zero > pos) {
  519. cpy = rspamd_mempool_alloc (priv->pool, zero - pos);
  520. memcpy (cpy, pos, zero - pos);
  521. msg_debug_milter ("got mail: %*s", (int)(zero - pos), cpy);
  522. addr = rspamd_email_address_from_smtp (cpy, zero - pos);
  523. if (addr) {
  524. session->from = addr;
  525. }
  526. /* TODO: parse esmtp arguments */
  527. break;
  528. }
  529. else {
  530. msg_debug_milter ("got weird from: %*s", (int)(end - pos),
  531. pos);
  532. /* That actually should not happen */
  533. cpy = rspamd_mempool_alloc (priv->pool, end - pos);
  534. memcpy (cpy, pos, end - pos);
  535. addr = rspamd_email_address_from_smtp (cpy, end - pos);
  536. if (addr) {
  537. session->from = addr;
  538. }
  539. break;
  540. }
  541. }
  542. break;
  543. case RSPAMD_MILTER_CMD_EOH:
  544. msg_debug_milter ("got eoh command");
  545. if (!session->message) {
  546. session->message = rspamd_fstring_sized_new (
  547. RSPAMD_MILTER_MESSAGE_CHUNK);
  548. }
  549. session->message = rspamd_fstring_append (session->message,
  550. "\r\n", 2);
  551. break;
  552. case RSPAMD_MILTER_CMD_OPTNEG:
  553. if (cmdlen != sizeof (guint32) * 3) {
  554. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  555. "optneg command");
  556. rspamd_milter_on_protocol_error (session, priv, err);
  557. return FALSE;
  558. }
  559. READ_INT_32 (pos, version);
  560. READ_INT_32 (pos, actions);
  561. READ_INT_32 (pos, protocol);
  562. msg_debug_milter ("optneg: version: %d, actions: %d, protocol: %d",
  563. version, actions, protocol);
  564. if (version < RSPAMD_MILTER_PROTO_VER) {
  565. msg_warn_milter ("MTA specifies too old protocol: %d, "
  566. "aborting connection", version);
  567. err = g_error_new (rspamd_milter_quark (), EINVAL, "invalid "
  568. "protocol version: %d", version);
  569. rspamd_milter_on_protocol_error (session, priv, err);
  570. return FALSE;
  571. }
  572. version = RSPAMD_MILTER_PROTO_VER;
  573. actions |= RSPAMD_MILTER_ACTIONS_MASK;
  574. protocol = RSPAMD_MILTER_FLAG_NOREPLY_MASK;
  575. return rspamd_milter_send_action (session, RSPAMD_MILTER_OPTNEG,
  576. version, actions, protocol);
  577. break;
  578. case RSPAMD_MILTER_CMD_QUIT:
  579. if (priv->out_chain) {
  580. msg_debug_milter ("quit command, refcount: %d, "
  581. "some output buffers left - draining",
  582. session->ref.refcount);
  583. priv->state = RSPAMD_MILTER_WRITE_AND_DIE;
  584. }
  585. else {
  586. msg_debug_milter ("quit command, refcount: %d",
  587. session->ref.refcount);
  588. priv->state = RSPAMD_MILTER_WANNA_DIE;
  589. REF_RETAIN (session);
  590. priv->fin_cb (priv->fd, session, priv->ud);
  591. REF_RELEASE (session);
  592. return FALSE;
  593. }
  594. break;
  595. case RSPAMD_MILTER_CMD_RCPT:
  596. msg_debug_milter ("rcpt command");
  597. while (pos < end) {
  598. struct rspamd_email_address *addr;
  599. gchar *cpy;
  600. zero = memchr (pos, '\0', end - pos);
  601. if (zero && zero > pos) {
  602. cpy = rspamd_mempool_alloc (priv->pool, end - pos);
  603. memcpy (cpy, pos, end - pos);
  604. msg_debug_milter ("got rcpt: %*s", (int)(zero - pos), cpy);
  605. addr = rspamd_email_address_from_smtp (cpy, zero - pos);
  606. if (addr) {
  607. if (!session->rcpts) {
  608. session->rcpts = g_ptr_array_sized_new (1);
  609. }
  610. g_ptr_array_add (session->rcpts, addr);
  611. }
  612. pos = zero + 1;
  613. }
  614. else {
  615. cpy = rspamd_mempool_alloc (priv->pool, end - pos);
  616. memcpy (cpy, pos, end - pos);
  617. msg_debug_milter ("got weird rcpt: %*s", (int)(end - pos),
  618. pos);
  619. /* That actually should not happen */
  620. addr = rspamd_email_address_from_smtp (cpy, end - pos);
  621. if (addr) {
  622. if (!session->rcpts) {
  623. session->rcpts = g_ptr_array_sized_new (1);
  624. }
  625. g_ptr_array_add (session->rcpts, addr);
  626. }
  627. break;
  628. }
  629. }
  630. break;
  631. case RSPAMD_MILTER_CMD_DATA:
  632. if (!session->message) {
  633. session->message = rspamd_fstring_sized_new (
  634. RSPAMD_MILTER_MESSAGE_CHUNK);
  635. }
  636. msg_debug_milter ("got data command");
  637. /* We do not need reply as specified */
  638. break;
  639. default:
  640. msg_debug_milter ("got bad command: %c", priv->parser.cur_cmd);
  641. break;
  642. }
  643. return TRUE;
  644. }
  645. static gboolean
  646. rspamd_milter_is_valid_cmd (guchar c)
  647. {
  648. switch (c) {
  649. case RSPAMD_MILTER_CMD_ABORT:
  650. case RSPAMD_MILTER_CMD_BODY:
  651. case RSPAMD_MILTER_CMD_CONNECT:
  652. case RSPAMD_MILTER_CMD_MACRO:
  653. case RSPAMD_MILTER_CMD_BODYEOB:
  654. case RSPAMD_MILTER_CMD_HELO:
  655. case RSPAMD_MILTER_CMD_QUIT_NC:
  656. case RSPAMD_MILTER_CMD_HEADER:
  657. case RSPAMD_MILTER_CMD_MAIL:
  658. case RSPAMD_MILTER_CMD_EOH:
  659. case RSPAMD_MILTER_CMD_OPTNEG:
  660. case RSPAMD_MILTER_CMD_QUIT:
  661. case RSPAMD_MILTER_CMD_RCPT:
  662. case RSPAMD_MILTER_CMD_DATA:
  663. case RSPAMD_MILTER_CMD_UNKNOWN:
  664. return TRUE;
  665. default:
  666. break;
  667. }
  668. return FALSE;
  669. }
  670. static gboolean
  671. rspamd_milter_consume_input (struct rspamd_milter_session *session,
  672. struct rspamd_milter_private *priv)
  673. {
  674. const guchar *p, *end;
  675. GError *err;
  676. p = priv->parser.buf->str + priv->parser.pos;
  677. end = priv->parser.buf->str + priv->parser.buf->len;
  678. while (p < end) {
  679. msg_debug_milter("offset: %d, state: %d",
  680. (gint)(p - (const guchar *)priv->parser.buf->str),
  681. priv->parser.state);
  682. switch (priv->parser.state) {
  683. case st_len_1:
  684. /* The first length byte in big endian order */
  685. priv->parser.datalen = 0;
  686. priv->parser.datalen |= *p << 24;
  687. priv->parser.state = st_len_2;
  688. p++;
  689. break;
  690. case st_len_2:
  691. /* The second length byte in big endian order */
  692. priv->parser.datalen |= *p << 16;
  693. priv->parser.state = st_len_3;
  694. p++;
  695. break;
  696. case st_len_3:
  697. /* The third length byte in big endian order */
  698. priv->parser.datalen |= *p << 8;
  699. priv->parser.state = st_len_4;
  700. p++;
  701. break;
  702. case st_len_4:
  703. /* The fourth length byte in big endian order */
  704. priv->parser.datalen |= *p;
  705. priv->parser.state = st_read_cmd;
  706. p++;
  707. break;
  708. case st_read_cmd:
  709. priv->parser.cur_cmd = *p;
  710. priv->parser.state = st_read_data;
  711. if (priv->parser.datalen < 1) {
  712. err = g_error_new (rspamd_milter_quark (), EINVAL,
  713. "Command length is too short");
  714. rspamd_milter_on_protocol_error (session, priv, err);
  715. return FALSE;
  716. }
  717. else {
  718. /* Eat command itself */
  719. priv->parser.datalen --;
  720. }
  721. p++;
  722. priv->parser.cmd_start = p - (const guchar *)priv->parser.buf->str;
  723. break;
  724. case st_read_data:
  725. /* We might need some more data in buffer for further steps */
  726. if (priv->parser.datalen >
  727. RSPAMD_MILTER_MESSAGE_CHUNK * 2) {
  728. err = g_error_new (rspamd_milter_quark (), E2BIG,
  729. "Command length is too big: %zd",
  730. priv->parser.datalen);
  731. rspamd_milter_on_protocol_error (session, priv, err);
  732. return FALSE;
  733. }
  734. if (!rspamd_milter_is_valid_cmd (priv->parser.cur_cmd)) {
  735. err = g_error_new (rspamd_milter_quark (), E2BIG,
  736. "Unvalid command: %c",
  737. priv->parser.cur_cmd);
  738. rspamd_milter_on_protocol_error (session, priv, err);
  739. return FALSE;
  740. }
  741. if (priv->parser.buf->allocated < priv->parser.datalen) {
  742. priv->parser.pos = p - (const guchar *)priv->parser.buf->str;
  743. priv->parser.buf = rspamd_fstring_grow (priv->parser.buf,
  744. priv->parser.buf->len + priv->parser.datalen);
  745. /* This can realloc buffer */
  746. rspamd_milter_plan_io (session, priv, EV_READ);
  747. goto end;
  748. }
  749. else {
  750. /* We may have the full command available */
  751. if (p + priv->parser.datalen <= end) {
  752. /* We can process command */
  753. if (!rspamd_milter_process_command (session, priv)) {
  754. return FALSE;
  755. }
  756. p += priv->parser.datalen;
  757. priv->parser.state = st_len_1;
  758. priv->parser.cur_cmd = '\0';
  759. priv->parser.cmd_start = 0;
  760. }
  761. else {
  762. /* Need to read more */
  763. priv->parser.pos = p - (const guchar *)priv->parser.buf->str;
  764. rspamd_milter_plan_io (session, priv, EV_READ);
  765. goto end;
  766. }
  767. }
  768. break;
  769. }
  770. }
  771. /* Leftover */
  772. switch (priv->parser.state) {
  773. case st_read_data:
  774. if (p + priv->parser.datalen <= end) {
  775. if (!rspamd_milter_process_command (session, priv)) {
  776. return FALSE;
  777. }
  778. priv->parser.state = st_len_1;
  779. priv->parser.cur_cmd = '\0';
  780. priv->parser.cmd_start = 0;
  781. }
  782. break;
  783. default:
  784. /* No need to do anything */
  785. break;
  786. }
  787. if (p == end) {
  788. priv->parser.buf->len = 0;
  789. priv->parser.pos = 0;
  790. priv->parser.cmd_start = 0;
  791. }
  792. if (priv->out_chain) {
  793. rspamd_milter_plan_io (session, priv, EV_READ|EV_WRITE);
  794. }
  795. else {
  796. rspamd_milter_plan_io (session, priv, EV_READ);
  797. }
  798. end:
  799. return TRUE;
  800. }
  801. static gboolean
  802. rspamd_milter_handle_session (struct rspamd_milter_session *session,
  803. struct rspamd_milter_private *priv)
  804. {
  805. struct rspamd_milter_outbuf *obuf, *obuf_tmp;
  806. gssize r, to_write;
  807. GError *err;
  808. g_assert (session != NULL);
  809. switch (priv->state) {
  810. case RSPAMD_MILTER_READ_MORE:
  811. if (priv->parser.buf->len >= priv->parser.buf->allocated) {
  812. priv->parser.buf = rspamd_fstring_grow (priv->parser.buf,
  813. priv->parser.buf->len * 2);
  814. }
  815. r = read (priv->fd, priv->parser.buf->str + priv->parser.buf->len,
  816. priv->parser.buf->allocated - priv->parser.buf->len);
  817. msg_debug_milter ("read %z bytes, %z remain, %z allocated",
  818. r, priv->parser.buf->len, priv->parser.buf->allocated);
  819. if (r == -1) {
  820. if (errno == EAGAIN || errno == EINTR) {
  821. rspamd_milter_plan_io (session, priv, EV_READ);
  822. }
  823. else {
  824. /* Fatal IO error */
  825. err = g_error_new (rspamd_milter_quark (), errno,
  826. "IO read error: %s", strerror (errno));
  827. REF_RETAIN (session);
  828. priv->err_cb (priv->fd, session, priv->ud, err);
  829. REF_RELEASE (session);
  830. g_error_free (err);
  831. }
  832. }
  833. else if (r == 0) {
  834. err = g_error_new (rspamd_milter_quark (), ECONNRESET,
  835. "Unexpected EOF");
  836. REF_RETAIN (session);
  837. priv->err_cb (priv->fd, session, priv->ud, err);
  838. REF_RELEASE (session);
  839. g_error_free (err);
  840. }
  841. else {
  842. priv->parser.buf->len += r;
  843. return rspamd_milter_consume_input (session, priv);
  844. }
  845. break;
  846. case RSPAMD_MILTER_WRITE_REPLY:
  847. case RSPAMD_MILTER_WRITE_AND_DIE:
  848. if (priv->out_chain == NULL) {
  849. if (priv->state == RSPAMD_MILTER_WRITE_AND_DIE) {
  850. /* Finished writing, let's die finally */
  851. msg_debug_milter ("output drained, terminating, refcount: %d",
  852. session->ref.refcount);
  853. /* Session should be destroyed by fin_cb... */
  854. REF_RETAIN (session);
  855. priv->fin_cb (priv->fd, session, priv->ud);
  856. REF_RELEASE (session);
  857. return FALSE;
  858. }
  859. else {
  860. /* We have written everything, so we can read something */
  861. priv->state = RSPAMD_MILTER_READ_MORE;
  862. rspamd_milter_plan_io (session, priv, EV_READ);
  863. }
  864. }
  865. else {
  866. DL_FOREACH_SAFE (priv->out_chain, obuf, obuf_tmp) {
  867. to_write = obuf->buf->len - obuf->pos;
  868. g_assert (to_write > 0);
  869. r = write (priv->fd, obuf->buf->str + obuf->pos, to_write);
  870. if (r == -1) {
  871. if (errno == EAGAIN || errno == EINTR) {
  872. rspamd_milter_plan_io (session, priv, EV_WRITE);
  873. }
  874. else {
  875. /* Fatal IO error */
  876. err = g_error_new (rspamd_milter_quark (), errno,
  877. "IO write error: %s", strerror (errno));
  878. REF_RETAIN (session);
  879. priv->err_cb (priv->fd, session, priv->ud, err);
  880. REF_RELEASE (session);
  881. g_error_free (err);
  882. return FALSE;
  883. }
  884. }
  885. else if (r == 0) {
  886. err = g_error_new (rspamd_milter_quark (), ECONNRESET,
  887. "Unexpected EOF");
  888. REF_RETAIN (session);
  889. priv->err_cb (priv->fd, session, priv->ud, err);
  890. REF_RELEASE (session);
  891. g_error_free (err);
  892. return FALSE;
  893. }
  894. else {
  895. if (r == to_write) {
  896. /* We have done with this buf */
  897. DL_DELETE (priv->out_chain, obuf);
  898. rspamd_milter_obuf_free (obuf);
  899. }
  900. else {
  901. /* We need to plan another write */
  902. obuf->pos += r;
  903. rspamd_milter_plan_io (session, priv, EV_WRITE);
  904. return TRUE;
  905. }
  906. }
  907. }
  908. /* Here we have written everything, so we can plan reading */
  909. priv->state = RSPAMD_MILTER_READ_MORE;
  910. rspamd_milter_plan_io (session, priv, EV_READ);
  911. }
  912. break;
  913. case RSPAMD_MILTER_WANNA_DIE:
  914. /* We are here after processing everything, so release session */
  915. REF_RELEASE (session);
  916. break;
  917. }
  918. return TRUE;
  919. }
  920. gboolean
  921. rspamd_milter_handle_socket (gint fd, const struct timeval *tv,
  922. rspamd_mempool_t *pool,
  923. struct event_base *ev_base, rspamd_milter_finish finish_cb,
  924. rspamd_milter_error error_cb, void *ud)
  925. {
  926. struct rspamd_milter_session *session;
  927. struct rspamd_milter_private *priv;
  928. g_assert (finish_cb != NULL);
  929. g_assert (error_cb != NULL);
  930. g_assert (milter_ctx != NULL);
  931. session = g_malloc0 (sizeof (*session));
  932. priv = g_malloc0 (sizeof (*priv));
  933. priv->fd = fd;
  934. priv->ud = ud;
  935. priv->fin_cb = finish_cb;
  936. priv->err_cb = error_cb;
  937. priv->parser.state = st_len_1;
  938. priv->parser.buf = rspamd_fstring_sized_new (RSPAMD_MILTER_MESSAGE_CHUNK + 5);
  939. priv->ev_base = ev_base;
  940. priv->state = RSPAMD_MILTER_READ_MORE;
  941. priv->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (), "milter");
  942. priv->discard_on_reject = milter_ctx->discard_on_reject;
  943. priv->quarantine_on_reject = milter_ctx->quarantine_on_reject;
  944. if (pool) {
  945. /* Copy tag */
  946. memcpy (priv->pool->tag.uid, pool->tag.uid, sizeof (pool->tag.uid));
  947. }
  948. priv->headers = kh_init (milter_headers_hash_t);
  949. kh_resize (milter_headers_hash_t, priv->headers, 32);
  950. if (tv) {
  951. memcpy (&priv->tv, tv, sizeof (*tv));
  952. priv->ptv = &priv->tv;
  953. }
  954. else {
  955. priv->ptv = NULL;
  956. }
  957. session->priv = priv;
  958. REF_INIT_RETAIN (session, rspamd_milter_session_dtor);
  959. if (milter_ctx->sessions_cache) {
  960. rspamd_worker_session_cache_add (milter_ctx->sessions_cache,
  961. priv->pool->tag.uid, &session->ref.refcount, session);
  962. }
  963. return rspamd_milter_handle_session (session, priv);
  964. }
  965. gboolean
  966. rspamd_milter_set_reply (struct rspamd_milter_session *session,
  967. rspamd_fstring_t *xcode,
  968. rspamd_fstring_t *rcode,
  969. rspamd_fstring_t *reply)
  970. {
  971. GString *buf;
  972. gboolean ret;
  973. buf = g_string_sized_new (xcode->len + rcode->len + reply->len + 2);
  974. rspamd_printf_gstring (buf, "%V %V %V", xcode, rcode, reply);
  975. ret = rspamd_milter_send_action (session, RSPAMD_MILTER_REPLYCODE,
  976. buf);
  977. g_string_free (buf, TRUE);
  978. return ret;
  979. }
  980. #define SET_COMMAND(cmd, sz, reply, pos) do { \
  981. guint32 _len; \
  982. _len = (sz) + 1; \
  983. (reply) = rspamd_fstring_sized_new (sizeof (_len) + _len); \
  984. (reply)->len = sizeof (_len) + _len; \
  985. _len = htonl (_len); \
  986. memcpy ((reply)->str, &_len, sizeof (_len)); \
  987. (reply)->str[sizeof(_len)] = (cmd); \
  988. (pos) = (guchar *)(reply)->str + sizeof (_len) + 1; \
  989. } while (0)
  990. gboolean
  991. rspamd_milter_send_action (struct rspamd_milter_session *session,
  992. enum rspamd_milter_reply act, ...)
  993. {
  994. guint32 ver, actions, protocol, idx;
  995. va_list ap;
  996. guchar cmd, *pos;
  997. rspamd_fstring_t *reply = NULL;
  998. gsize len;
  999. GString *name, *value;
  1000. const char *reason;
  1001. struct rspamd_milter_outbuf *obuf;
  1002. struct rspamd_milter_private *priv = session->priv;
  1003. va_start (ap, act);
  1004. cmd = act;
  1005. switch (act) {
  1006. case RSPAMD_MILTER_ACCEPT:
  1007. case RSPAMD_MILTER_CONTINUE:
  1008. case RSPAMD_MILTER_DISCARD:
  1009. case RSPAMD_MILTER_PROGRESS:
  1010. case RSPAMD_MILTER_REJECT:
  1011. case RSPAMD_MILTER_TEMPFAIL:
  1012. /* No additional arguments */
  1013. SET_COMMAND (cmd, 0, reply, pos);
  1014. break;
  1015. case RSPAMD_MILTER_QUARANTINE:
  1016. reason = va_arg (ap, const char *);
  1017. if (reason == NULL) {
  1018. reason = "";
  1019. }
  1020. len = strlen (reason);
  1021. SET_COMMAND (cmd, len + 1, reply, pos);
  1022. memcpy (pos, reason, len + 1);
  1023. break;
  1024. case RSPAMD_MILTER_ADDHEADER:
  1025. name = va_arg (ap, GString *);
  1026. value = va_arg (ap, GString *);
  1027. /* Name and value must be zero terminated */
  1028. SET_COMMAND (cmd, name->len + value->len + 2, reply, pos);
  1029. memcpy (pos, name->str, name->len + 1);
  1030. pos += name->len + 1;
  1031. memcpy (pos, value->str, value->len + 1);
  1032. break;
  1033. case RSPAMD_MILTER_CHGHEADER:
  1034. case RSPAMD_MILTER_INSHEADER:
  1035. idx = htonl (va_arg (ap, guint32));
  1036. name = va_arg (ap, GString *);
  1037. value = va_arg (ap, GString *);
  1038. /* Name and value must be zero terminated */
  1039. SET_COMMAND (cmd, name->len + value->len + 2 + sizeof (guint32),
  1040. reply, pos);
  1041. memcpy (pos, &idx, sizeof (idx));
  1042. pos += sizeof (idx);
  1043. memcpy (pos, name->str, name->len + 1);
  1044. pos += name->len + 1;
  1045. memcpy (pos, value->str, value->len + 1);
  1046. break;
  1047. case RSPAMD_MILTER_REPLYCODE:
  1048. case RSPAMD_MILTER_ADDRCPT:
  1049. case RSPAMD_MILTER_DELRCPT:
  1050. case RSPAMD_MILTER_CHGFROM:
  1051. /* Single GString * argument */
  1052. value = va_arg (ap, GString *);
  1053. SET_COMMAND (cmd, value->len + 1, reply, pos);
  1054. memcpy (pos, value->str, value->len + 1);
  1055. break;
  1056. case RSPAMD_MILTER_OPTNEG:
  1057. ver = htonl (va_arg (ap, guint32));
  1058. actions = htonl (va_arg (ap, guint32));
  1059. protocol = htonl (va_arg (ap, guint32));
  1060. SET_COMMAND (cmd, sizeof (guint32) * 3, reply, pos);
  1061. memcpy (pos, &ver, sizeof (ver));
  1062. pos += sizeof (ver);
  1063. memcpy (pos, &actions, sizeof (actions));
  1064. pos += sizeof (actions);
  1065. memcpy (pos, &protocol, sizeof (protocol));
  1066. break;
  1067. default:
  1068. msg_err_milter ("invalid command: %c", cmd);
  1069. break;
  1070. }
  1071. va_end (ap);
  1072. if (reply) {
  1073. obuf = g_malloc (sizeof (*obuf));
  1074. obuf->buf = reply;
  1075. obuf->pos = 0;
  1076. DL_APPEND (priv->out_chain, obuf);
  1077. priv->state = RSPAMD_MILTER_WRITE_REPLY;
  1078. rspamd_milter_plan_io (session, priv, EV_WRITE);
  1079. return TRUE;
  1080. }
  1081. return FALSE;
  1082. }
  1083. gboolean
  1084. rspamd_milter_add_header (struct rspamd_milter_session *session,
  1085. GString *name, GString *value)
  1086. {
  1087. return rspamd_milter_send_action (session, RSPAMD_MILTER_ADDHEADER,
  1088. name, value);
  1089. }
  1090. gboolean
  1091. rspamd_milter_del_header (struct rspamd_milter_session *session,
  1092. GString *name)
  1093. {
  1094. GString value;
  1095. guint32 idx = 1;
  1096. value.str = (gchar *)"";
  1097. value.len = 0;
  1098. return rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1099. idx, name, value);
  1100. }
  1101. void
  1102. rspamd_milter_session_unref (struct rspamd_milter_session *session)
  1103. {
  1104. REF_RELEASE (session);
  1105. }
  1106. struct rspamd_milter_session *
  1107. rspamd_milter_session_ref (struct rspamd_milter_session *session)
  1108. {
  1109. REF_RETAIN (session);
  1110. return session;
  1111. }
  1112. #define IF_MACRO(lit) RSPAMD_FTOK_ASSIGN (&srch, (lit)); \
  1113. found = g_hash_table_lookup (session->macros, &srch); \
  1114. if (found)
  1115. static void
  1116. rspamd_milter_macro_http (struct rspamd_milter_session *session,
  1117. struct rspamd_http_message *msg)
  1118. {
  1119. rspamd_ftok_t *found, srch;
  1120. struct rspamd_milter_private *priv = session->priv;
  1121. /*
  1122. * We assume postfix macros here, sendmail ones might be slightly
  1123. * different
  1124. */
  1125. if (!session->macros) {
  1126. return;
  1127. }
  1128. IF_MACRO("{i}") {
  1129. rspamd_http_message_add_header_len (msg, QUEUE_ID_HEADER,
  1130. found->begin, found->len);
  1131. }
  1132. else {
  1133. IF_MACRO("i") {
  1134. rspamd_http_message_add_header_len (msg, QUEUE_ID_HEADER,
  1135. found->begin, found->len);
  1136. }
  1137. }
  1138. IF_MACRO("{v}") {
  1139. rspamd_http_message_add_header_len (msg, USER_AGENT_HEADER,
  1140. found->begin, found->len);
  1141. }
  1142. else {
  1143. IF_MACRO("v") {
  1144. rspamd_http_message_add_header_len (msg, USER_AGENT_HEADER,
  1145. found->begin, found->len);
  1146. }
  1147. }
  1148. IF_MACRO("{cipher}") {
  1149. rspamd_http_message_add_header_len (msg, TLS_CIPHER_HEADER,
  1150. found->begin, found->len);
  1151. }
  1152. IF_MACRO("{tls_version}") {
  1153. rspamd_http_message_add_header_len (msg, TLS_VERSION_HEADER,
  1154. found->begin, found->len);
  1155. }
  1156. IF_MACRO("{auth_authen}") {
  1157. rspamd_http_message_add_header_len (msg, USER_HEADER,
  1158. found->begin, found->len);
  1159. }
  1160. IF_MACRO("{rcpt_mailer}") {
  1161. rspamd_http_message_add_header_len (msg, MAILER_HEADER,
  1162. found->begin, found->len);
  1163. }
  1164. if (milter_ctx->client_ca_name) {
  1165. IF_MACRO ("{cert_issuer}") {
  1166. rspamd_http_message_add_header_len (msg, CERT_ISSUER_HEADER,
  1167. found->begin, found->len);
  1168. if (found->len == strlen (milter_ctx->client_ca_name) &&
  1169. rspamd_cryptobox_memcmp (found->begin,
  1170. milter_ctx->client_ca_name, found->len) == 0) {
  1171. msg_debug_milter ("process certificate issued by %T", found);
  1172. IF_MACRO("{cert_subject}") {
  1173. rspamd_http_message_add_header_len (msg, USER_HEADER,
  1174. found->begin, found->len);
  1175. }
  1176. }
  1177. else {
  1178. msg_debug_milter ("skip certificate issued by %T", found);
  1179. }
  1180. }
  1181. }
  1182. else {
  1183. IF_MACRO ("{cert_issuer}") {
  1184. rspamd_http_message_add_header_len (msg, CERT_ISSUER_HEADER,
  1185. found->begin, found->len);
  1186. }
  1187. }
  1188. if (!session->hostname || session->hostname->len == 0) {
  1189. IF_MACRO("{client_name}") {
  1190. if (!(found->len == sizeof ("unknown") - 1 &&
  1191. memcmp (found->begin, "unknown",
  1192. sizeof ("unknown") - 1) == 0)) {
  1193. rspamd_http_message_add_header_len (msg, HOSTNAME_HEADER,
  1194. found->begin, found->len);
  1195. }
  1196. else {
  1197. msg_debug_milter ("skip unknown hostname from being added");
  1198. }
  1199. }
  1200. }
  1201. IF_MACRO("{daemon_name}") {
  1202. /* Postfix style */
  1203. rspamd_http_message_add_header_len (msg, MTA_NAME_HEADER,
  1204. found->begin, found->len);
  1205. }
  1206. else {
  1207. /* Sendmail style */
  1208. IF_MACRO("{j}") {
  1209. rspamd_http_message_add_header_len (msg, MTA_NAME_HEADER,
  1210. found->begin, found->len);
  1211. }
  1212. else {
  1213. IF_MACRO("j") {
  1214. rspamd_http_message_add_header_len (msg, MTA_NAME_HEADER,
  1215. found->begin, found->len);
  1216. }
  1217. }
  1218. }
  1219. }
  1220. struct rspamd_http_message *
  1221. rspamd_milter_to_http (struct rspamd_milter_session *session)
  1222. {
  1223. struct rspamd_http_message *msg;
  1224. guint i;
  1225. struct rspamd_email_address *rcpt;
  1226. struct rspamd_milter_private *priv = session->priv;
  1227. g_assert (session != NULL);
  1228. msg = rspamd_http_new_message (HTTP_REQUEST);
  1229. msg->url = rspamd_fstring_assign (msg->url, "/" MSG_CMD_CHECK_V2,
  1230. sizeof ("/" MSG_CMD_CHECK_V2) - 1);
  1231. if (session->message) {
  1232. rspamd_http_message_set_body_from_fstring_steal (msg, session->message);
  1233. session->message = NULL;
  1234. }
  1235. if (session->hostname && RSPAMD_FSTRING_LEN (session->hostname) > 0) {
  1236. if (!(session->hostname->len == sizeof ("unknown") - 1 &&
  1237. memcmp (RSPAMD_FSTRING_DATA (session->hostname), "unknown",
  1238. sizeof ("unknown") - 1) == 0)) {
  1239. rspamd_http_message_add_header_fstr (msg, HOSTNAME_HEADER,
  1240. session->hostname);
  1241. }
  1242. else {
  1243. msg_debug_milter ("skip unknown hostname from being added");
  1244. }
  1245. }
  1246. if (session->helo && session->helo->len > 0) {
  1247. rspamd_http_message_add_header_fstr (msg, HELO_HEADER,
  1248. session->helo);
  1249. }
  1250. if (session->from) {
  1251. rspamd_http_message_add_header_len (msg, FROM_HEADER,
  1252. session->from->raw, session->from->raw_len);
  1253. }
  1254. if (session->rcpts) {
  1255. PTR_ARRAY_FOREACH (session->rcpts, i, rcpt) {
  1256. rspamd_http_message_add_header_len (msg, RCPT_HEADER,
  1257. rcpt->raw, rcpt->raw_len);
  1258. }
  1259. }
  1260. if (session->addr) {
  1261. if (rspamd_inet_address_get_af (session->addr) != AF_UNIX) {
  1262. rspamd_http_message_add_header (msg, IP_ADDR_HEADER,
  1263. rspamd_inet_address_to_string_pretty (session->addr));
  1264. }
  1265. else {
  1266. rspamd_http_message_add_header (msg, IP_ADDR_HEADER,
  1267. rspamd_inet_address_to_string (session->addr));
  1268. }
  1269. }
  1270. rspamd_milter_macro_http (session, msg);
  1271. rspamd_http_message_add_header (msg, MILTER_HEADER, "Yes");
  1272. return msg;
  1273. }
  1274. void *
  1275. rspamd_milter_update_userdata (struct rspamd_milter_session *session,
  1276. void *ud)
  1277. {
  1278. struct rspamd_milter_private *priv = session->priv;
  1279. void *prev_ud;
  1280. prev_ud = priv->ud;
  1281. priv->ud = ud;
  1282. return prev_ud;
  1283. }
  1284. static void
  1285. rspamd_milter_remove_header_safe (struct rspamd_milter_session *session,
  1286. const gchar *key, gint nhdr)
  1287. {
  1288. gint i;
  1289. GString *hname, *hvalue;
  1290. struct rspamd_milter_private *priv = session->priv;
  1291. khiter_t k;
  1292. GArray *ar;
  1293. k = kh_get (milter_headers_hash_t, priv->headers, (char *)key);
  1294. if (k != kh_end (priv->headers)) {
  1295. ar = kh_val (priv->headers, k);
  1296. hname = g_string_new (key);
  1297. hvalue = g_string_new ("");
  1298. if (nhdr >= 1) {
  1299. rspamd_milter_send_action (session,
  1300. RSPAMD_MILTER_CHGHEADER,
  1301. nhdr, hname, hvalue);
  1302. }
  1303. else if (nhdr == 0) {
  1304. /* We need to clear all headers */
  1305. for (i = 1; i <= ar->len; i ++) {
  1306. rspamd_milter_send_action (session,
  1307. RSPAMD_MILTER_CHGHEADER,
  1308. i, hname, hvalue);
  1309. }
  1310. }
  1311. else {
  1312. /* Remove from the end */
  1313. if (nhdr >= -(ar->len)) {
  1314. rspamd_milter_send_action (session,
  1315. RSPAMD_MILTER_CHGHEADER,
  1316. ar->len + nhdr + 1, hname, hvalue);
  1317. }
  1318. }
  1319. g_string_free (hname, TRUE);
  1320. g_string_free (hvalue, TRUE);
  1321. }
  1322. }
  1323. /*
  1324. * Returns `TRUE` if action has been processed internally by this function
  1325. */
  1326. static gboolean
  1327. rspamd_milter_process_milter_block (struct rspamd_milter_session *session,
  1328. const ucl_object_t *obj, gint action)
  1329. {
  1330. const ucl_object_t *elt, *cur, *cur_elt;
  1331. ucl_object_iter_t it;
  1332. struct rspamd_milter_private *priv = session->priv;
  1333. GString *hname, *hvalue;
  1334. gint idx = -1;
  1335. if (obj && ucl_object_type (obj) == UCL_OBJECT) {
  1336. elt = ucl_object_lookup (obj, "remove_headers");
  1337. /*
  1338. * remove_headers: {"name": 1, ... }
  1339. * where number is the header's position starting from '1'
  1340. */
  1341. if (elt && ucl_object_type (elt) == UCL_OBJECT) {
  1342. it = NULL;
  1343. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1344. if (ucl_object_type (cur) == UCL_INT) {
  1345. rspamd_milter_remove_header_safe (session,
  1346. ucl_object_key (cur),
  1347. ucl_object_toint (cur));
  1348. }
  1349. }
  1350. }
  1351. elt = ucl_object_lookup (obj, "add_headers");
  1352. /*
  1353. * add_headers: {"name": "value", ... }
  1354. * name could have multiple values
  1355. * -or- (since 1.7)
  1356. * {"name": {"value": "val", "order": 0}, ... }
  1357. */
  1358. if (elt && ucl_object_type (elt) == UCL_OBJECT) {
  1359. it = NULL;
  1360. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1361. ucl_object_iter_t *elt_it;
  1362. elt_it = ucl_object_iterate_new (cur);
  1363. while ((cur_elt = ucl_object_iterate_safe (elt_it, true)) != NULL) {
  1364. if (ucl_object_type (cur_elt) == UCL_STRING) {
  1365. hname = g_string_new (ucl_object_key (cur));
  1366. hvalue = g_string_new (ucl_object_tostring (cur_elt));
  1367. rspamd_milter_send_action (session,
  1368. RSPAMD_MILTER_ADDHEADER,
  1369. hname, hvalue);
  1370. g_string_free (hname, TRUE);
  1371. g_string_free (hvalue, TRUE);
  1372. }
  1373. else if (ucl_object_type (cur_elt) == UCL_OBJECT) {
  1374. const ucl_object_t *val;
  1375. val = ucl_object_lookup (cur_elt, "value");
  1376. if (val && ucl_object_type (val) == UCL_STRING) {
  1377. const ucl_object_t *idx_obj;
  1378. gboolean has_idx = FALSE;
  1379. idx_obj = ucl_object_lookup_any (cur_elt, "order",
  1380. "index", NULL);
  1381. if (idx_obj) {
  1382. idx = ucl_object_toint (idx_obj);
  1383. has_idx = TRUE;
  1384. }
  1385. hname = g_string_new (ucl_object_key (cur));
  1386. hvalue = g_string_new (ucl_object_tostring (val));
  1387. if (has_idx) {
  1388. if (idx >= 0) {
  1389. rspamd_milter_send_action (session,
  1390. RSPAMD_MILTER_INSHEADER,
  1391. idx,
  1392. hname, hvalue);
  1393. }
  1394. else {
  1395. /* Calculate negative offset */
  1396. if (-idx <= priv->cur_hdr) {
  1397. rspamd_milter_send_action (session,
  1398. RSPAMD_MILTER_INSHEADER,
  1399. priv->cur_hdr + idx + 1,
  1400. hname, hvalue);
  1401. }
  1402. else {
  1403. rspamd_milter_send_action (session,
  1404. RSPAMD_MILTER_INSHEADER,
  1405. 0,
  1406. hname, hvalue);
  1407. }
  1408. }
  1409. }
  1410. else {
  1411. rspamd_milter_send_action (session,
  1412. RSPAMD_MILTER_ADDHEADER,
  1413. hname, hvalue);
  1414. }
  1415. g_string_free (hname, TRUE);
  1416. g_string_free (hvalue, TRUE);
  1417. }
  1418. }
  1419. }
  1420. ucl_object_iterate_free (elt_it);
  1421. }
  1422. }
  1423. elt = ucl_object_lookup (obj, "change_from");
  1424. if (elt && ucl_object_type (elt) == UCL_STRING) {
  1425. hvalue = g_string_new (ucl_object_tostring (elt));
  1426. rspamd_milter_send_action (session,
  1427. RSPAMD_MILTER_CHGFROM,
  1428. hvalue);
  1429. g_string_free (hvalue, TRUE);
  1430. }
  1431. elt = ucl_object_lookup (obj, "add_rcpt");
  1432. if (elt && ucl_object_type (elt) == UCL_ARRAY) {
  1433. it = NULL;
  1434. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1435. hvalue = g_string_new (ucl_object_tostring (cur));
  1436. rspamd_milter_send_action (session,
  1437. RSPAMD_MILTER_ADDRCPT,
  1438. hvalue);
  1439. g_string_free (hvalue, TRUE);
  1440. }
  1441. }
  1442. elt = ucl_object_lookup (obj, "del_rcpt");
  1443. if (elt && ucl_object_type (elt) == UCL_ARRAY) {
  1444. it = NULL;
  1445. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1446. hvalue = g_string_new (ucl_object_tostring (cur));
  1447. rspamd_milter_send_action (session,
  1448. RSPAMD_MILTER_DELRCPT,
  1449. hvalue);
  1450. g_string_free (hvalue, TRUE);
  1451. }
  1452. }
  1453. elt = ucl_object_lookup (obj, "reject");
  1454. if (elt && ucl_object_type (elt) == UCL_STRING) {
  1455. if (strcmp (ucl_object_tostring (elt), "discard") == 0) {
  1456. priv->discard_on_reject = TRUE;
  1457. msg_info_milter ("discard message instead of rejection");
  1458. }
  1459. else if (strcmp (ucl_object_tostring (elt), "quarantine") == 0) {
  1460. priv->quarantine_on_reject = TRUE;
  1461. msg_info_milter ("quarantine message instead of rejection");
  1462. }
  1463. else {
  1464. priv->discard_on_reject = FALSE;
  1465. priv->quarantine_on_reject = FALSE;
  1466. }
  1467. }
  1468. elt = ucl_object_lookup (obj, "no_action");
  1469. if (elt && ucl_object_type (elt) == UCL_BOOLEAN) {
  1470. priv->no_action = ucl_object_toboolean (elt);
  1471. }
  1472. }
  1473. if (action == METRIC_ACTION_ADD_HEADER) {
  1474. elt = ucl_object_lookup (obj, "spam_header");
  1475. if (elt) {
  1476. if (ucl_object_type (elt) == UCL_STRING) {
  1477. rspamd_milter_remove_header_safe (session,
  1478. milter_ctx->spam_header,
  1479. 0);
  1480. hname = g_string_new (milter_ctx->spam_header);
  1481. hvalue = g_string_new (ucl_object_tostring (elt));
  1482. rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1483. (guint32)1, hname, hvalue);
  1484. g_string_free (hname, TRUE);
  1485. g_string_free (hvalue, TRUE);
  1486. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1487. return TRUE;
  1488. }
  1489. else if (ucl_object_type (elt) == UCL_OBJECT) {
  1490. it = NULL;
  1491. while ((cur = ucl_object_iterate (elt, &it, true)) != NULL) {
  1492. rspamd_milter_remove_header_safe (session,
  1493. ucl_object_key (cur),
  1494. 0);
  1495. hname = g_string_new (ucl_object_key (cur));
  1496. hvalue = g_string_new (ucl_object_tostring (cur));
  1497. rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1498. (guint32) 1, hname, hvalue);
  1499. g_string_free (hname, TRUE);
  1500. g_string_free (hvalue, TRUE);
  1501. }
  1502. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1503. return TRUE;
  1504. }
  1505. }
  1506. }
  1507. return FALSE;
  1508. }
  1509. void
  1510. rspamd_milter_send_task_results (struct rspamd_milter_session *session,
  1511. const ucl_object_t *results)
  1512. {
  1513. const ucl_object_t *elt;
  1514. struct rspamd_milter_private *priv = session->priv;
  1515. const gchar *str_action;
  1516. gint action = METRIC_ACTION_REJECT;
  1517. rspamd_fstring_t *xcode = NULL, *rcode = NULL, *reply = NULL;
  1518. GString *hname, *hvalue;
  1519. gboolean processed = FALSE;
  1520. if (results == NULL) {
  1521. msg_err_milter ("cannot find scan results, tempfail");
  1522. rspamd_milter_send_action (session, RSPAMD_MILTER_TEMPFAIL);
  1523. goto cleanup;
  1524. }
  1525. elt = ucl_object_lookup (results, "action");
  1526. if (!elt) {
  1527. msg_err_milter ("cannot find action in results, tempfail");
  1528. rspamd_milter_send_action (session, RSPAMD_MILTER_TEMPFAIL);
  1529. goto cleanup;
  1530. }
  1531. str_action = ucl_object_tostring (elt);
  1532. rspamd_action_from_str (str_action, &action);
  1533. elt = ucl_object_lookup (results, "messages");
  1534. if (elt) {
  1535. const ucl_object_t *smtp_res;
  1536. const gchar *msg;
  1537. gsize len = 0;
  1538. smtp_res = ucl_object_lookup (elt, "smtp_message");
  1539. if (smtp_res) {
  1540. msg = ucl_object_tolstring (smtp_res, &len);
  1541. reply = rspamd_fstring_new_init (msg, len);
  1542. }
  1543. }
  1544. /* Deal with milter headers */
  1545. elt = ucl_object_lookup (results, "milter");
  1546. if (elt) {
  1547. processed = rspamd_milter_process_milter_block (session, elt, action);
  1548. }
  1549. /* DKIM-Signature */
  1550. elt = ucl_object_lookup (results, "dkim-signature");
  1551. if (elt) {
  1552. hname = g_string_new (RSPAMD_MILTER_DKIM_HEADER);
  1553. hvalue = g_string_new (ucl_object_tostring (elt));
  1554. rspamd_milter_send_action (session, RSPAMD_MILTER_INSHEADER,
  1555. 1, hname, hvalue);
  1556. g_string_free (hname, TRUE);
  1557. g_string_free (hvalue, TRUE);
  1558. }
  1559. if (processed) {
  1560. goto cleanup;
  1561. }
  1562. if (priv->no_action) {
  1563. msg_info_milter ("do not apply action %s, no_action is set",
  1564. str_action);
  1565. hname = g_string_new (RSPAMD_MILTER_ACTION_HEADER);
  1566. hvalue = g_string_new (str_action);
  1567. rspamd_milter_send_action (session, RSPAMD_MILTER_ADDHEADER,
  1568. hname, hvalue);
  1569. g_string_free (hname, TRUE);
  1570. g_string_free (hvalue, TRUE);
  1571. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1572. goto cleanup;
  1573. }
  1574. switch (action) {
  1575. case METRIC_ACTION_REJECT:
  1576. if (priv->discard_on_reject) {
  1577. rspamd_milter_send_action (session, RSPAMD_MILTER_DISCARD);
  1578. }
  1579. else if (priv->quarantine_on_reject) {
  1580. /* TODO: be more flexible about SMTP messages */
  1581. rspamd_milter_send_action (session, RSPAMD_MILTER_QUARANTINE,
  1582. RSPAMD_MILTER_QUARANTINE_MESSAGE);
  1583. /* Quarantine also requires accept action, all hail Sendmail */
  1584. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1585. }
  1586. else {
  1587. rcode = rspamd_fstring_new_init (RSPAMD_MILTER_RCODE_REJECT,
  1588. sizeof (RSPAMD_MILTER_RCODE_REJECT) - 1);
  1589. xcode = rspamd_fstring_new_init (RSPAMD_MILTER_XCODE_REJECT,
  1590. sizeof (RSPAMD_MILTER_XCODE_REJECT) - 1);
  1591. if (!reply) {
  1592. if (milter_ctx->reject_message == NULL) {
  1593. reply = rspamd_fstring_new_init (
  1594. RSPAMD_MILTER_REJECT_MESSAGE,
  1595. sizeof (RSPAMD_MILTER_REJECT_MESSAGE) - 1);
  1596. }
  1597. else {
  1598. reply = rspamd_fstring_new_init (milter_ctx->reject_message,
  1599. strlen (milter_ctx->reject_message));
  1600. }
  1601. }
  1602. rspamd_milter_set_reply (session, rcode, xcode, reply);
  1603. }
  1604. break;
  1605. case METRIC_ACTION_SOFT_REJECT:
  1606. rcode = rspamd_fstring_new_init (RSPAMD_MILTER_RCODE_TEMPFAIL,
  1607. sizeof (RSPAMD_MILTER_RCODE_TEMPFAIL) - 1);
  1608. xcode = rspamd_fstring_new_init (RSPAMD_MILTER_XCODE_TEMPFAIL,
  1609. sizeof (RSPAMD_MILTER_XCODE_TEMPFAIL) - 1);
  1610. if (!reply) {
  1611. reply = rspamd_fstring_new_init (RSPAMD_MILTER_TEMPFAIL_MESSAGE,
  1612. sizeof (RSPAMD_MILTER_TEMPFAIL_MESSAGE) - 1);
  1613. }
  1614. rspamd_milter_set_reply (session, rcode, xcode, reply);
  1615. break;
  1616. case METRIC_ACTION_REWRITE_SUBJECT:
  1617. elt = ucl_object_lookup (results, "subject");
  1618. if (elt) {
  1619. hname = g_string_new ("Subject");
  1620. hvalue = g_string_new (ucl_object_tostring (elt));
  1621. rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1622. (guint32)1, hname, hvalue);
  1623. g_string_free (hname, TRUE);
  1624. g_string_free (hvalue, TRUE);
  1625. }
  1626. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1627. break;
  1628. case METRIC_ACTION_ADD_HEADER:
  1629. /* Remove existing headers */
  1630. rspamd_milter_remove_header_safe (session,
  1631. milter_ctx->spam_header,
  1632. 0);
  1633. hname = g_string_new (milter_ctx->spam_header);
  1634. hvalue = g_string_new ("Yes");
  1635. rspamd_milter_send_action (session, RSPAMD_MILTER_CHGHEADER,
  1636. (guint32)1, hname, hvalue);
  1637. g_string_free (hname, TRUE);
  1638. g_string_free (hvalue, TRUE);
  1639. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1640. break;
  1641. case METRIC_ACTION_GREYLIST:
  1642. case METRIC_ACTION_NOACTION:
  1643. default:
  1644. rspamd_milter_send_action (session, RSPAMD_MILTER_ACCEPT);
  1645. break;
  1646. }
  1647. cleanup:
  1648. rspamd_fstring_free (rcode);
  1649. rspamd_fstring_free (xcode);
  1650. rspamd_fstring_free (reply);
  1651. rspamd_milter_session_reset (session, RSPAMD_MILTER_RESET_ABORT);
  1652. }
  1653. void
  1654. rspamd_milter_init_library (const struct rspamd_milter_context *ctx)
  1655. {
  1656. milter_ctx = ctx;
  1657. }
  1658. rspamd_mempool_t *
  1659. rspamd_milter_get_session_pool (struct rspamd_milter_session *session)
  1660. {
  1661. struct rspamd_milter_private *priv = session->priv;
  1662. return priv->pool;
  1663. }