Du kannst nicht mehr als 25 Themen auswählen Themen müssen mit entweder einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.

rspamd_proxy.c 56KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "libutil/util.h"
  18. #include "libutil/map.h"
  19. #include "libutil/upstream.h"
  20. #include "libutil/http.h"
  21. #include "libutil/http_private.h"
  22. #include "libserver/protocol.h"
  23. #include "libserver/protocol_internal.h"
  24. #include "libserver/cfg_file.h"
  25. #include "libserver/url.h"
  26. #include "libserver/dns.h"
  27. #include "libmime/message.h"
  28. #include "rspamd.h"
  29. #include "libserver/worker_util.h"
  30. #include "worker_private.h"
  31. #include "lua/lua_common.h"
  32. #include "keypairs_cache.h"
  33. #include "libstat/stat_api.h"
  34. #include "ottery.h"
  35. #include "unix-std.h"
  36. #include "libserver/milter.h"
  37. #include "libserver/milter_internal.h"
  38. #include "libmime/lang_detection.h"
  39. #include "contrib/zstd/zstd.h"
  40. #ifdef HAVE_NETINET_TCP_H
  41. #include <netinet/tcp.h> /* for TCP_NODELAY */
  42. #endif
  43. /* Rotate keys each minute by default */
  44. #define DEFAULT_ROTATION_TIME 60.0
  45. #define DEFAULT_RETRIES 5
  46. #define msg_err_session(...) rspamd_default_log_function (G_LOG_LEVEL_CRITICAL, \
  47. session->pool->tag.tagname, session->pool->tag.uid, \
  48. G_STRFUNC, \
  49. __VA_ARGS__)
  50. #define msg_warn_session(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  51. session->pool->tag.tagname, session->pool->tag.uid, \
  52. G_STRFUNC, \
  53. __VA_ARGS__)
  54. #define msg_info_session(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  55. session->pool->tag.tagname, session->pool->tag.uid, \
  56. G_STRFUNC, \
  57. __VA_ARGS__)
  58. #define msg_debug_session(...) rspamd_conditional_debug_fast (NULL, session->client_addr, \
  59. rspamd_proxy_log_id, "proxy", session->pool->tag.uid, \
  60. G_STRFUNC, \
  61. __VA_ARGS__)
  62. INIT_LOG_MODULE(proxy)
  63. gpointer init_rspamd_proxy (struct rspamd_config *cfg);
  64. void start_rspamd_proxy (struct rspamd_worker *worker);
  65. worker_t rspamd_proxy_worker = {
  66. "rspamd_proxy", /* Name */
  67. init_rspamd_proxy, /* Init function */
  68. start_rspamd_proxy, /* Start function */
  69. RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE | RSPAMD_WORKER_SCANNER,
  70. RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */
  71. RSPAMD_WORKER_VER
  72. };
  73. struct rspamd_http_upstream {
  74. gchar *name;
  75. gchar *settings_id;
  76. struct upstream_list *u;
  77. struct rspamd_cryptobox_pubkey *key;
  78. gdouble timeout;
  79. struct timeval io_tv;
  80. gint parser_from_ref;
  81. gint parser_to_ref;
  82. gboolean local;
  83. gboolean self_scan;
  84. gboolean compress;
  85. };
  86. struct rspamd_http_mirror {
  87. gchar *name;
  88. gchar *settings_id;
  89. struct upstream_list *u;
  90. struct rspamd_cryptobox_pubkey *key;
  91. gdouble prob;
  92. gdouble timeout;
  93. struct timeval io_tv;
  94. gint parser_from_ref;
  95. gint parser_to_ref;
  96. gboolean local;
  97. gboolean compress;
  98. };
  99. static const guint64 rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL;
  100. struct rspamd_proxy_ctx {
  101. guint64 magic;
  102. /* Events base */
  103. struct event_base *ev_base;
  104. /* DNS resolver */
  105. struct rspamd_dns_resolver *resolver;
  106. /* Config */
  107. struct rspamd_config *cfg;
  108. /* END OF COMMON PART */
  109. gdouble timeout;
  110. struct timeval io_tv;
  111. /* Encryption key for clients */
  112. struct rspamd_cryptobox_keypair *key;
  113. /* Keys cache */
  114. struct rspamd_keypair_cache *keys_cache;
  115. /* Upstreams to use */
  116. GHashTable *upstreams;
  117. /* Mirrors to send traffic to */
  118. GPtrArray *mirrors;
  119. /* Default upstream */
  120. struct rspamd_http_upstream *default_upstream;
  121. /* Local rotating keypair for upstreams */
  122. struct rspamd_cryptobox_keypair *local_key;
  123. struct event rotate_ev;
  124. gdouble rotate_tm;
  125. lua_State *lua_state;
  126. /* Array of callback functions called on end of scan to compare results */
  127. GArray *cmp_refs;
  128. /* Maximum count for retries */
  129. guint max_retries;
  130. /* If we have self_scanning backends, we need to work as a normal worker */
  131. gboolean has_self_scan;
  132. /* It is not HTTP but milter proxy */
  133. gboolean milter;
  134. /* Discard messages instead of rejecting them */
  135. gboolean discard_on_reject;
  136. /* Quarantine messages instead of rejecting them */
  137. gboolean quarantine_on_reject;
  138. /* Milter spam header */
  139. gchar *spam_header;
  140. /* CA name that can be used for client certificates */
  141. gchar *client_ca_name;
  142. /* Milter rejection message */
  143. gchar *reject_message;
  144. /* Sessions cache */
  145. void *sessions_cache;
  146. struct rspamd_milter_context milter_ctx;
  147. /* Language detector */
  148. struct rspamd_lang_detector *lang_det;
  149. };
  150. enum rspamd_backend_flags {
  151. RSPAMD_BACKEND_REPLIED = 1 << 0,
  152. RSPAMD_BACKEND_CLOSED = 1 << 1,
  153. RSPAMD_BACKEND_PARSED = 1 << 2,
  154. };
  155. struct rspamd_proxy_session;
  156. struct rspamd_proxy_backend_connection {
  157. const gchar *name;
  158. struct rspamd_cryptobox_keypair *local_key;
  159. struct rspamd_cryptobox_pubkey *remote_key;
  160. struct upstream *up;
  161. struct rspamd_http_connection *backend_conn;
  162. ucl_object_t *results;
  163. const gchar *err;
  164. struct rspamd_proxy_session *s;
  165. struct timeval *io_tv;
  166. gint backend_sock;
  167. enum rspamd_backend_flags flags;
  168. gint parser_from_ref;
  169. gint parser_to_ref;
  170. struct rspamd_task *task;
  171. };
  172. enum rspamd_proxy_legacy_support {
  173. LEGACY_SUPPORT_NO = 0,
  174. LEGACY_SUPPORT_RSPAMC,
  175. LEGACY_SUPPORT_SPAMC
  176. };
  177. struct rspamd_proxy_session {
  178. struct rspamd_worker *worker;
  179. rspamd_mempool_t *pool;
  180. struct rspamd_proxy_ctx *ctx;
  181. rspamd_inet_addr_t *client_addr;
  182. struct rspamd_http_connection *client_conn;
  183. struct rspamd_milter_session *client_milter_conn;
  184. struct rspamd_http_upstream *backend;
  185. gpointer map;
  186. gchar *fname;
  187. gpointer shmem_ref;
  188. struct rspamd_proxy_backend_connection *master_conn;
  189. struct rspamd_http_message *client_message;
  190. GPtrArray *mirror_conns;
  191. gsize map_len;
  192. gint client_sock;
  193. enum rspamd_proxy_legacy_support legacy_support;
  194. gint retries;
  195. ref_entry_t ref;
  196. };
  197. static gboolean proxy_send_master_message (struct rspamd_proxy_session *session);
  198. static GQuark
  199. rspamd_proxy_quark (void)
  200. {
  201. return g_quark_from_static_string ("rspamd-proxy");
  202. }
  203. static gboolean
  204. rspamd_proxy_parse_lua_parser (lua_State *L, const ucl_object_t *obj,
  205. gint *ref_from, gint *ref_to, GError **err)
  206. {
  207. const gchar *lua_script;
  208. gsize slen;
  209. gint err_idx, ref_idx;
  210. GString *tb = NULL;
  211. gboolean has_ref = FALSE;
  212. g_assert (obj != NULL);
  213. g_assert (ref_from != NULL);
  214. g_assert (ref_to != NULL);
  215. *ref_from = -1;
  216. *ref_to = -1;
  217. lua_script = ucl_object_tolstring (obj, &slen);
  218. lua_pushcfunction (L, &rspamd_lua_traceback);
  219. err_idx = lua_gettop (L);
  220. /* Load data */
  221. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  222. g_set_error (err,
  223. rspamd_proxy_quark (),
  224. EINVAL,
  225. "cannot load lua parser script: %s",
  226. lua_tostring (L, -1));
  227. lua_settop (L, 0); /* Error function */
  228. return FALSE;
  229. }
  230. /* Now do it */
  231. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  232. tb = lua_touserdata (L, -1);
  233. g_set_error (err,
  234. rspamd_proxy_quark (),
  235. EINVAL,
  236. "cannot init lua parser script: %s",
  237. tb->str);
  238. g_string_free (tb, TRUE);
  239. lua_settop (L, 0);
  240. return FALSE;
  241. }
  242. if (lua_istable (L, -1)) {
  243. /*
  244. * We have a table, so we check for two keys:
  245. * 'from' -> function
  246. * 'to' -> function
  247. *
  248. * From converts parent request to a client one
  249. * To converts client request to a parent one
  250. */
  251. lua_pushstring (L, "from");
  252. lua_gettable (L, -2);
  253. if (lua_isfunction (L, -1)) {
  254. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  255. *ref_from = ref_idx;
  256. has_ref = TRUE;
  257. }
  258. lua_pushstring (L, "to");
  259. lua_gettable (L, -2);
  260. if (lua_isfunction (L, -1)) {
  261. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  262. *ref_to = ref_idx;
  263. has_ref = TRUE;
  264. }
  265. }
  266. else if (!lua_isfunction (L, -1)) {
  267. g_set_error (err,
  268. rspamd_proxy_quark (),
  269. EINVAL,
  270. "cannot init lua parser script: "
  271. "must return function");
  272. lua_settop (L, 0);
  273. return FALSE;
  274. }
  275. else {
  276. /* Just parser from protocol */
  277. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  278. *ref_from = ref_idx;
  279. lua_settop (L, 0);
  280. has_ref = TRUE;
  281. }
  282. return has_ref;
  283. }
  284. static gboolean
  285. rspamd_proxy_parse_upstream (rspamd_mempool_t *pool,
  286. const ucl_object_t *obj,
  287. gpointer ud,
  288. struct rspamd_rcl_section *section,
  289. GError **err)
  290. {
  291. const ucl_object_t *elt;
  292. struct rspamd_http_upstream *up = NULL;
  293. struct rspamd_proxy_ctx *ctx;
  294. struct rspamd_rcl_struct_parser *pd = ud;
  295. lua_State *L;
  296. ctx = pd->user_struct;
  297. L = ctx->lua_state;
  298. if (ucl_object_type (obj) != UCL_OBJECT) {
  299. g_set_error (err, rspamd_proxy_quark (), 100,
  300. "upstream option must be an object");
  301. return FALSE;
  302. }
  303. up = rspamd_mempool_alloc0 (pool, sizeof (*up));
  304. elt = ucl_object_lookup (obj, "name");
  305. if (elt == NULL) {
  306. if (ucl_object_key (obj)) {
  307. if (strcmp (ucl_object_key (obj), "upstream") == 0) {
  308. /* Iterate over the object and find upstream elements */
  309. ucl_object_iter_t it = NULL;
  310. const ucl_object_t *cur;
  311. gboolean ret = TRUE;
  312. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  313. if (!rspamd_proxy_parse_upstream (pool, cur, ud,
  314. section, err)) {
  315. ret = FALSE;
  316. }
  317. }
  318. return ret;
  319. }
  320. else {
  321. /* Inside upstream */
  322. up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
  323. }
  324. }
  325. else {
  326. g_set_error (err, rspamd_proxy_quark (), 100,
  327. "upstream option must have some name definition");
  328. return FALSE;
  329. }
  330. }
  331. else {
  332. up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  333. }
  334. up->parser_from_ref = -1;
  335. up->parser_to_ref = -1;
  336. up->timeout = ctx->timeout;
  337. elt = ucl_object_lookup (obj, "key");
  338. if (elt != NULL) {
  339. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  340. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  341. if (up->key == NULL) {
  342. g_set_error (err, rspamd_proxy_quark (), 100,
  343. "cannot read upstream key");
  344. goto err;
  345. }
  346. rspamd_mempool_add_destructor (pool,
  347. (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
  348. }
  349. elt = ucl_object_lookup (obj, "self_scan");
  350. if (elt && ucl_object_toboolean (elt)) {
  351. up->self_scan = TRUE;
  352. ctx->has_self_scan = TRUE;
  353. }
  354. elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
  355. if (elt && ucl_object_toboolean (elt)) {
  356. up->compress = TRUE;
  357. }
  358. elt = ucl_object_lookup (obj, "hosts");
  359. if (elt == NULL && !up->self_scan) {
  360. g_set_error (err, rspamd_proxy_quark (), 100,
  361. "upstream option must have some hosts definition");
  362. goto err;
  363. }
  364. if (elt) {
  365. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  366. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  367. g_set_error (err, rspamd_proxy_quark (), 100,
  368. "upstream has bad hosts definition");
  369. goto err;
  370. }
  371. rspamd_mempool_add_destructor (pool,
  372. (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
  373. }
  374. elt = ucl_object_lookup (obj, "default");
  375. if (elt) {
  376. if (ucl_object_toboolean (elt)) {
  377. ctx->default_upstream = up;
  378. }
  379. }
  380. else if (up->self_scan) {
  381. ctx->default_upstream = up;
  382. }
  383. elt = ucl_object_lookup (obj, "local");
  384. if (elt && ucl_object_toboolean (elt)) {
  385. up->local = TRUE;
  386. }
  387. elt = ucl_object_lookup (obj, "timeout");
  388. if (elt) {
  389. ucl_object_todouble_safe (elt, &up->timeout);
  390. }
  391. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  392. if (elt && ucl_object_type (elt) == UCL_STRING) {
  393. up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  394. }
  395. /*
  396. * Accept lua function here in form
  397. * fun :: String -> UCL
  398. */
  399. elt = ucl_object_lookup (obj, "parser");
  400. if (elt) {
  401. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  402. &up->parser_to_ref, err)) {
  403. goto err;
  404. }
  405. rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
  406. rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
  407. }
  408. double_to_tv (up->timeout, &up->io_tv);
  409. g_hash_table_insert (ctx->upstreams, up->name, up);
  410. return TRUE;
  411. err:
  412. return FALSE;
  413. }
  414. static gboolean
  415. rspamd_proxy_parse_mirror (rspamd_mempool_t *pool,
  416. const ucl_object_t *obj,
  417. gpointer ud,
  418. struct rspamd_rcl_section *section,
  419. GError **err)
  420. {
  421. const ucl_object_t *elt;
  422. struct rspamd_http_mirror *up = NULL;
  423. struct rspamd_proxy_ctx *ctx;
  424. struct rspamd_rcl_struct_parser *pd = ud;
  425. lua_State *L;
  426. ctx = pd->user_struct;
  427. L = ctx->lua_state;
  428. if (ucl_object_type (obj) != UCL_OBJECT) {
  429. g_set_error (err, rspamd_proxy_quark (), 100,
  430. "mirror option must be an object");
  431. return FALSE;
  432. }
  433. up = rspamd_mempool_alloc0 (pool, sizeof (*up));
  434. elt = ucl_object_lookup (obj, "name");
  435. if (elt == NULL) {
  436. if (ucl_object_key (obj)) {
  437. if (strcmp (ucl_object_key (obj), "mirror") == 0) {
  438. /* Iterate over the object and find upstream elements */
  439. ucl_object_iter_t it = NULL;
  440. const ucl_object_t *cur;
  441. gboolean ret = TRUE;
  442. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  443. if (!rspamd_proxy_parse_mirror (pool, cur, ud,
  444. section, err)) {
  445. ret = FALSE;
  446. }
  447. }
  448. return ret;
  449. }
  450. else {
  451. /* Inside upstream */
  452. up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
  453. }
  454. }
  455. else {
  456. g_set_error (err, rspamd_proxy_quark (), 100,
  457. "mirror option must have some name definition");
  458. return FALSE;
  459. }
  460. }
  461. else {
  462. up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  463. }
  464. up->parser_to_ref = -1;
  465. up->parser_from_ref = -1;
  466. up->timeout = ctx->timeout;
  467. elt = ucl_object_lookup (obj, "key");
  468. if (elt != NULL) {
  469. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  470. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  471. if (up->key == NULL) {
  472. g_set_error (err, rspamd_proxy_quark (), 100,
  473. "cannot read mirror key");
  474. goto err;
  475. }
  476. rspamd_mempool_add_destructor (pool,
  477. (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
  478. }
  479. elt = ucl_object_lookup (obj, "hosts");
  480. if (elt == NULL) {
  481. g_set_error (err, rspamd_proxy_quark (), 100,
  482. "mirror option must have some hosts definition");
  483. goto err;
  484. }
  485. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  486. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  487. g_set_error (err, rspamd_proxy_quark (), 100,
  488. "mirror has bad hosts definition");
  489. goto err;
  490. }
  491. rspamd_mempool_add_destructor (pool,
  492. (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
  493. elt = ucl_object_lookup_any (obj, "probability", "prob", NULL);
  494. if (elt) {
  495. up->prob = ucl_object_todouble (elt);
  496. }
  497. else {
  498. up->prob = 1.0;
  499. }
  500. elt = ucl_object_lookup (obj, "local");
  501. if (elt && ucl_object_toboolean (elt)) {
  502. up->local = TRUE;
  503. }
  504. elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
  505. if (elt && ucl_object_toboolean (elt)) {
  506. up->compress = TRUE;
  507. }
  508. elt = ucl_object_lookup (obj, "timeout");
  509. if (elt) {
  510. ucl_object_todouble_safe (elt, &up->timeout);
  511. }
  512. /*
  513. * Accept lua function here in form
  514. * fun :: String -> UCL
  515. */
  516. elt = ucl_object_lookup (obj, "parser");
  517. if (elt) {
  518. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  519. &up->parser_to_ref, err)) {
  520. goto err;
  521. }
  522. rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
  523. rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
  524. }
  525. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  526. if (elt && ucl_object_type (elt) == UCL_STRING) {
  527. up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  528. }
  529. double_to_tv (up->timeout, &up->io_tv);
  530. g_ptr_array_add (ctx->mirrors, up);
  531. return TRUE;
  532. err:
  533. return FALSE;
  534. }
  535. static gboolean
  536. rspamd_proxy_parse_script (rspamd_mempool_t *pool,
  537. const ucl_object_t *obj,
  538. gpointer ud,
  539. struct rspamd_rcl_section *section,
  540. GError **err)
  541. {
  542. struct rspamd_proxy_ctx *ctx;
  543. struct rspamd_rcl_struct_parser *pd = ud;
  544. lua_State *L;
  545. const gchar *lua_script;
  546. gsize slen;
  547. gint err_idx, ref_idx;
  548. GString *tb = NULL;
  549. struct stat st;
  550. ctx = pd->user_struct;
  551. L = ctx->lua_state;
  552. if (ucl_object_type (obj) != UCL_STRING) {
  553. g_set_error (err, rspamd_proxy_quark (), 100,
  554. "script option must be a string with file or lua chunk");
  555. return FALSE;
  556. }
  557. lua_script = ucl_object_tolstring (obj, &slen);
  558. lua_pushcfunction (L, &rspamd_lua_traceback);
  559. err_idx = lua_gettop (L);
  560. if (stat (lua_script, &st) != -1) {
  561. /* Load file */
  562. if (luaL_loadfile (L, lua_script) != 0) {
  563. g_set_error (err,
  564. rspamd_proxy_quark (),
  565. EINVAL,
  566. "cannot load lua parser script: %s",
  567. lua_tostring (L, -1));
  568. lua_settop (L, 0); /* Error function */
  569. goto err;
  570. }
  571. }
  572. else {
  573. /* Load data directly */
  574. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  575. g_set_error (err,
  576. rspamd_proxy_quark (),
  577. EINVAL,
  578. "cannot load lua parser script: %s",
  579. lua_tostring (L, -1));
  580. lua_settop (L, 0); /* Error function */
  581. goto err;
  582. }
  583. }
  584. /* Now do it */
  585. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  586. tb = lua_touserdata (L, -1);
  587. g_set_error (err,
  588. rspamd_proxy_quark (),
  589. EINVAL,
  590. "cannot init lua parser script: %s",
  591. tb->str);
  592. g_string_free (tb, TRUE);
  593. lua_settop (L, 0);
  594. goto err;
  595. }
  596. if (!lua_isfunction (L, -1)) {
  597. g_set_error (err,
  598. rspamd_proxy_quark (),
  599. EINVAL,
  600. "cannot init lua parser script: "
  601. "must return function, %s returned",
  602. lua_typename (L, lua_type (L, -1)));
  603. lua_settop (L, 0);
  604. goto err;
  605. }
  606. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  607. lua_settop (L, 0);
  608. g_array_append_val (ctx->cmp_refs, ref_idx);
  609. return TRUE;
  610. err:
  611. return FALSE;
  612. }
  613. gpointer
  614. init_rspamd_proxy (struct rspamd_config *cfg)
  615. {
  616. struct rspamd_proxy_ctx *ctx;
  617. GQuark type;
  618. type = g_quark_try_string ("rspamd_proxy");
  619. ctx = rspamd_mempool_alloc0 (cfg->cfg_pool,
  620. sizeof (struct rspamd_proxy_ctx));
  621. ctx->magic = rspamd_rspamd_proxy_magic;
  622. ctx->timeout = 120.0;
  623. ctx->upstreams = g_hash_table_new (rspamd_strcase_hash, rspamd_strcase_equal);
  624. rspamd_mempool_add_destructor (cfg->cfg_pool,
  625. (rspamd_mempool_destruct_t)g_hash_table_unref, ctx->upstreams);
  626. ctx->mirrors = g_ptr_array_new ();
  627. rspamd_mempool_add_destructor (cfg->cfg_pool,
  628. (rspamd_mempool_destruct_t)rspamd_ptr_array_free_hard, ctx->mirrors);
  629. ctx->rotate_tm = DEFAULT_ROTATION_TIME;
  630. ctx->cfg = cfg;
  631. ctx->lua_state = cfg->lua_state;
  632. ctx->cmp_refs = g_array_new (FALSE, FALSE, sizeof (gint));
  633. rspamd_mempool_add_destructor (cfg->cfg_pool,
  634. (rspamd_mempool_destruct_t)rspamd_array_free_hard, ctx->cmp_refs);
  635. ctx->max_retries = DEFAULT_RETRIES;
  636. ctx->spam_header = RSPAMD_MILTER_SPAM_HEADER;
  637. rspamd_rcl_register_worker_option (cfg,
  638. type,
  639. "timeout",
  640. rspamd_rcl_parse_struct_time,
  641. ctx,
  642. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, timeout),
  643. RSPAMD_CL_FLAG_TIME_FLOAT,
  644. "IO timeout");
  645. rspamd_rcl_register_worker_option (cfg,
  646. type,
  647. "rotate",
  648. rspamd_rcl_parse_struct_time,
  649. ctx,
  650. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, rotate_tm),
  651. RSPAMD_CL_FLAG_TIME_FLOAT,
  652. "Rotation keys time, default: "
  653. G_STRINGIFY (DEFAULT_ROTATION_TIME) " seconds");
  654. rspamd_rcl_register_worker_option (cfg,
  655. type,
  656. "keypair",
  657. rspamd_rcl_parse_struct_keypair,
  658. ctx,
  659. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, key),
  660. 0,
  661. "Server's keypair");
  662. rspamd_rcl_register_worker_option (cfg,
  663. type,
  664. "upstream",
  665. rspamd_proxy_parse_upstream,
  666. ctx,
  667. 0,
  668. 0,
  669. "List of upstreams");
  670. rspamd_rcl_register_worker_option (cfg,
  671. type,
  672. "mirror",
  673. rspamd_proxy_parse_mirror,
  674. ctx,
  675. 0,
  676. RSPAMD_CL_FLAG_MULTIPLE,
  677. "List of mirrors");
  678. rspamd_rcl_register_worker_option (cfg,
  679. type,
  680. "script",
  681. rspamd_proxy_parse_script,
  682. ctx,
  683. 0,
  684. RSPAMD_CL_FLAG_MULTIPLE,
  685. "Compare script to be executed");
  686. rspamd_rcl_register_worker_option (cfg,
  687. type,
  688. "max_retries",
  689. rspamd_rcl_parse_struct_integer,
  690. ctx,
  691. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, max_retries),
  692. RSPAMD_CL_FLAG_UINT,
  693. "Maximum number of retries for master connection");
  694. rspamd_rcl_register_worker_option (cfg,
  695. type,
  696. "milter",
  697. rspamd_rcl_parse_struct_boolean,
  698. ctx,
  699. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, milter),
  700. 0,
  701. "Accept milter connections, not HTTP");
  702. rspamd_rcl_register_worker_option (cfg,
  703. type,
  704. "discard_on_reject",
  705. rspamd_rcl_parse_struct_boolean,
  706. ctx,
  707. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, discard_on_reject),
  708. 0,
  709. "Tell MTA to discard rejected messages silently");
  710. rspamd_rcl_register_worker_option (cfg,
  711. type,
  712. "quarantine_on_reject",
  713. rspamd_rcl_parse_struct_boolean,
  714. ctx,
  715. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, quarantine_on_reject),
  716. 0,
  717. "Tell MTA to quarantine rejected messages");
  718. rspamd_rcl_register_worker_option (cfg,
  719. type,
  720. "spam_header",
  721. rspamd_rcl_parse_struct_string,
  722. ctx,
  723. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, spam_header),
  724. 0,
  725. "Use the specific spam header (default: X-Spam)");
  726. rspamd_rcl_register_worker_option (cfg,
  727. type,
  728. "client_ca_name",
  729. rspamd_rcl_parse_struct_string,
  730. ctx,
  731. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, client_ca_name),
  732. 0,
  733. "Allow certificates issued by this CA to be treated as client certificates");
  734. rspamd_rcl_register_worker_option (cfg,
  735. type,
  736. "reject_message",
  737. rspamd_rcl_parse_struct_string,
  738. ctx,
  739. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, reject_message),
  740. 0,
  741. "Use custom rejection message");
  742. return ctx;
  743. }
  744. static void
  745. proxy_backend_close_connection (struct rspamd_proxy_backend_connection *conn)
  746. {
  747. if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  748. if (conn->backend_conn) {
  749. rspamd_http_connection_reset (conn->backend_conn);
  750. rspamd_http_connection_unref (conn->backend_conn);
  751. close (conn->backend_sock);
  752. }
  753. conn->flags |= RSPAMD_BACKEND_CLOSED;
  754. }
  755. }
  756. static gboolean
  757. proxy_backend_parse_results (struct rspamd_proxy_session *session,
  758. struct rspamd_proxy_backend_connection *conn,
  759. lua_State *L, gint parser_ref,
  760. const gchar *in, gsize inlen)
  761. {
  762. struct ucl_parser *parser;
  763. GString *tb = NULL;
  764. gint err_idx;
  765. if (inlen == 0 || in == NULL) {
  766. return FALSE;
  767. }
  768. if (parser_ref != -1) {
  769. /* Call parser function */
  770. lua_pushcfunction (L, &rspamd_lua_traceback);
  771. err_idx = lua_gettop (L);
  772. lua_rawgeti (L, LUA_REGISTRYINDEX, parser_ref);
  773. /* XXX: copies all data */
  774. lua_pushlstring (L, in, inlen);
  775. if (lua_pcall (L, 1, 1, err_idx) != 0) {
  776. tb = lua_touserdata (L, -1);
  777. msg_err_session (
  778. "cannot run lua parser script: %s",
  779. tb->str);
  780. g_string_free (tb, TRUE);
  781. lua_settop (L, 0);
  782. return FALSE;
  783. }
  784. conn->results = ucl_object_lua_import (L, -1);
  785. lua_settop (L, 0);
  786. }
  787. else {
  788. parser = ucl_parser_new (0);
  789. if (!ucl_parser_add_chunk (parser, in, inlen)) {
  790. gchar *encoded;
  791. encoded = rspamd_encode_base64 (in, inlen, 0, NULL);
  792. msg_err_session ("cannot parse input: %s", ucl_parser_get_error (
  793. parser));
  794. msg_err_session ("input encoded: %s", encoded);
  795. ucl_parser_free (parser);
  796. g_free (encoded);
  797. return FALSE;
  798. }
  799. conn->results = ucl_parser_get_object (parser);
  800. ucl_parser_free (parser);
  801. }
  802. return TRUE;
  803. }
  804. static void
  805. proxy_call_cmp_script (struct rspamd_proxy_session *session, gint cbref)
  806. {
  807. GString *tb = NULL;
  808. gint err_idx;
  809. guint i;
  810. struct rspamd_proxy_backend_connection *conn;
  811. lua_State *L;
  812. L = session->ctx->lua_state;
  813. lua_pushcfunction (L, &rspamd_lua_traceback);
  814. err_idx = lua_gettop (L);
  815. lua_rawgeti (L, LUA_REGISTRYINDEX, cbref);
  816. lua_createtable (L, 0, session->mirror_conns->len + 1);
  817. /* Now push master results */
  818. if (session->master_conn && session->master_conn->results) {
  819. lua_pushstring (L, "master");
  820. ucl_object_push_lua (L, session->master_conn->results, true);
  821. lua_settable (L, -3);
  822. }
  823. else {
  824. lua_pushstring (L, "master");
  825. lua_pushstring (L, "no results");
  826. lua_settable (L, -3);
  827. }
  828. for (i = 0; i < session->mirror_conns->len; i ++) {
  829. conn = g_ptr_array_index (session->mirror_conns, i);
  830. if (conn->results) {
  831. lua_pushstring (L, conn->name);
  832. ucl_object_push_lua (L, conn->results, true);
  833. lua_settable (L, -3);
  834. }
  835. else {
  836. lua_pushstring (L, conn->name);
  837. lua_pushstring (L, conn->err ? conn->err : "unknown error");
  838. lua_settable (L, -3);
  839. }
  840. }
  841. if (lua_pcall (L, 1, 0, err_idx) != 0) {
  842. tb = lua_touserdata (L, -1);
  843. msg_err_session (
  844. "cannot run lua compare script: %s",
  845. tb->str);
  846. g_string_free (tb, TRUE);
  847. }
  848. lua_settop (L, 0);
  849. }
  850. static void
  851. proxy_session_dtor (struct rspamd_proxy_session *session)
  852. {
  853. guint i;
  854. gint cbref;
  855. struct rspamd_proxy_backend_connection *conn;
  856. if (session->master_conn && session->master_conn->results) {
  857. for (i = 0; i < session->ctx->cmp_refs->len; i++) {
  858. cbref = g_array_index (session->ctx->cmp_refs, gint, i);
  859. proxy_call_cmp_script (session, cbref);
  860. }
  861. }
  862. if (session->master_conn) {
  863. proxy_backend_close_connection (session->master_conn);
  864. }
  865. if (session->client_milter_conn) {
  866. rspamd_milter_session_unref (session->client_milter_conn);
  867. }
  868. else if (session->client_conn) {
  869. rspamd_http_connection_reset (session->client_conn);
  870. rspamd_http_connection_unref (session->client_conn);
  871. }
  872. if (session->map && session->map_len) {
  873. munmap (session->map, session->map_len);
  874. }
  875. for (i = 0; i < session->mirror_conns->len; i ++) {
  876. conn = g_ptr_array_index (session->mirror_conns, i);
  877. if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  878. proxy_backend_close_connection (conn);
  879. }
  880. if (conn->results) {
  881. ucl_object_unref (conn->results);
  882. }
  883. }
  884. if (session->master_conn) {
  885. if (session->master_conn->results) {
  886. ucl_object_unref (session->master_conn->results);
  887. }
  888. if (session->master_conn->task) {
  889. rspamd_session_destroy (session->master_conn->task->s);
  890. }
  891. }
  892. g_ptr_array_free (session->mirror_conns, TRUE);
  893. rspamd_http_message_shmem_unref (session->shmem_ref);
  894. rspamd_http_message_unref (session->client_message);
  895. if (session->client_addr) {
  896. rspamd_inet_address_free (session->client_addr);
  897. }
  898. if (session->client_sock != -1) {
  899. close (session->client_sock);
  900. }
  901. if (session->ctx->sessions_cache) {
  902. rspamd_worker_session_cache_remove (session->ctx->sessions_cache,
  903. session);
  904. }
  905. if (session->pool) {
  906. rspamd_mempool_delete (session->pool);
  907. }
  908. g_free (session);
  909. }
  910. static void
  911. proxy_request_compress (struct rspamd_http_message *msg)
  912. {
  913. guint flags;
  914. ZSTD_CCtx *zctx;
  915. rspamd_fstring_t *body;
  916. const gchar *in;
  917. gsize inlen;
  918. flags = rspamd_http_message_get_flags (msg);
  919. if (!rspamd_http_message_find_header (msg, "Compression")) {
  920. if ((flags & RSPAMD_HTTP_FLAG_SHMEM) ||
  921. !(flags & RSPAMD_HTTP_FLAG_HAS_BODY)) {
  922. /* Cannot compress shared or empty message */
  923. return;
  924. }
  925. in = rspamd_http_message_get_body (msg, &inlen);
  926. if (in == NULL || inlen == 0) {
  927. return;
  928. }
  929. body = rspamd_fstring_sized_new (ZSTD_compressBound (inlen));
  930. zctx = ZSTD_createCCtx ();
  931. body->len = ZSTD_compressCCtx (zctx, body->str, body->allocated,
  932. in, inlen, 1);
  933. if (ZSTD_isError (body->len)) {
  934. msg_err ("compression error");
  935. rspamd_fstring_free (body);
  936. ZSTD_freeCCtx (zctx);
  937. return;
  938. }
  939. ZSTD_freeCCtx (zctx);
  940. rspamd_http_message_set_body_from_fstring_steal (msg, body);
  941. rspamd_http_message_add_header (msg, "Compression", "zstd");
  942. }
  943. }
  944. static void
  945. proxy_request_decompress (struct rspamd_http_message *msg)
  946. {
  947. rspamd_fstring_t *body;
  948. const gchar *in;
  949. gsize inlen, outlen, r;
  950. ZSTD_DStream *zstream;
  951. ZSTD_inBuffer zin;
  952. ZSTD_outBuffer zout;
  953. if (rspamd_http_message_find_header (msg, "Compression")) {
  954. in = rspamd_http_message_get_body (msg, &inlen);
  955. if (in == NULL || inlen == 0) {
  956. return;
  957. }
  958. zstream = ZSTD_createDStream ();
  959. ZSTD_initDStream (zstream);
  960. zin.pos = 0;
  961. zin.src = in;
  962. zin.size = inlen;
  963. if ((outlen = ZSTD_getDecompressedSize (zin.src, zin.size)) == 0) {
  964. outlen = ZSTD_DStreamOutSize ();
  965. }
  966. body = rspamd_fstring_sized_new (outlen);
  967. zout.dst = body->str;
  968. zout.pos = 0;
  969. zout.size = outlen;
  970. while (zin.pos < zin.size) {
  971. r = ZSTD_decompressStream (zstream, &zout, &zin);
  972. if (ZSTD_isError (r)) {
  973. msg_err ("Decompression error: %s", ZSTD_getErrorName (r));
  974. ZSTD_freeDStream (zstream);
  975. rspamd_fstring_free (body);
  976. return;
  977. }
  978. if (zout.pos == zout.size) {
  979. /* We need to extend output buffer */
  980. zout.size = zout.size * 1.5 + 1.0;
  981. body = rspamd_fstring_grow (body, zout.size);
  982. zout.size = body->allocated;
  983. zout.dst = body->str;
  984. }
  985. }
  986. body->len = zout.pos;
  987. ZSTD_freeDStream (zstream);
  988. rspamd_http_message_set_body_from_fstring_steal (msg, body);
  989. rspamd_http_message_remove_header (msg, "Compression");
  990. }
  991. return;
  992. }
  993. static struct rspamd_proxy_session *
  994. proxy_session_refresh (struct rspamd_proxy_session *session)
  995. {
  996. struct rspamd_proxy_session *nsession;
  997. nsession = g_malloc0 (sizeof (*nsession));
  998. nsession->client_milter_conn = session->client_milter_conn;
  999. session->client_milter_conn = NULL;
  1000. rspamd_milter_update_userdata (nsession->client_milter_conn,
  1001. nsession);
  1002. nsession->client_addr = session->client_addr;
  1003. session->client_addr = NULL;
  1004. nsession->ctx = session->ctx;
  1005. nsession->worker = session->worker;
  1006. nsession->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (), "proxy");
  1007. nsession->client_sock = session->client_sock;
  1008. session->client_sock = -1;
  1009. nsession->mirror_conns = g_ptr_array_sized_new (nsession->ctx->mirrors->len);
  1010. REF_INIT_RETAIN (nsession, proxy_session_dtor);
  1011. if (nsession->ctx->sessions_cache) {
  1012. rspamd_worker_session_cache_add (nsession->ctx->sessions_cache,
  1013. nsession->pool->tag.uid, &nsession->ref.refcount, nsession);
  1014. }
  1015. return nsession;
  1016. }
  1017. static gboolean
  1018. proxy_check_file (struct rspamd_http_message *msg,
  1019. struct rspamd_proxy_session *session)
  1020. {
  1021. const rspamd_ftok_t *tok, *key_tok;
  1022. rspamd_ftok_t srch;
  1023. gchar *file_str;
  1024. GHashTable *query_args;
  1025. GHashTableIter it;
  1026. gpointer k, v;
  1027. struct http_parser_url u;
  1028. rspamd_fstring_t *new_url;
  1029. tok = rspamd_http_message_find_header (msg, "File");
  1030. if (tok) {
  1031. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  1032. session->map = rspamd_file_xmap (file_str, PROT_READ, &session->map_len,
  1033. TRUE);
  1034. if (session->map == NULL) {
  1035. if (session->map_len != 0) {
  1036. msg_err_session ("cannot map %s: %s", file_str,
  1037. strerror (errno));
  1038. return FALSE;
  1039. }
  1040. }
  1041. /* Remove header after processing */
  1042. rspamd_http_message_remove_header (msg, "File");
  1043. session->fname = file_str;
  1044. }
  1045. else {
  1046. /* Need to parse query URL */
  1047. if (http_parser_parse_url (RSPAMD_FSTRING_DATA (msg->url),
  1048. RSPAMD_FSTRING_LEN (msg->url), 0, &u) != 0) {
  1049. msg_err_session ("bad request url: %V", msg->url);
  1050. return FALSE;
  1051. }
  1052. if (u.field_set & (1 << UF_QUERY)) {
  1053. /* In case if we have a query, we need to store it somewhere */
  1054. query_args = rspamd_http_message_parse_query (msg);
  1055. srch.begin = "File";
  1056. srch.len = strlen ("File");
  1057. tok = g_hash_table_lookup (query_args, &srch);
  1058. if (tok) {
  1059. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  1060. session->map = rspamd_file_xmap (file_str, PROT_READ,
  1061. &session->map_len, TRUE);
  1062. if (session->map == NULL) {
  1063. if (session->map_len != 0) {
  1064. msg_err_session ("cannot map %s: %s", file_str,
  1065. strerror (errno));
  1066. g_hash_table_unref (query_args);
  1067. return FALSE;
  1068. }
  1069. }
  1070. /* We need to create a new URL with file attribute removed */
  1071. new_url = rspamd_fstring_new_init (RSPAMD_FSTRING_DATA (msg->url),
  1072. u.field_data[UF_QUERY].off);
  1073. new_url = rspamd_fstring_append (new_url, "?", 1);
  1074. g_hash_table_iter_init (&it, query_args);
  1075. while (g_hash_table_iter_next (&it, &k, &v)) {
  1076. key_tok = k;
  1077. tok = v;
  1078. if (!rspamd_ftok_icase_equal (key_tok, &srch)) {
  1079. rspamd_printf_fstring (&new_url, "%T=%T&",
  1080. key_tok, tok);
  1081. }
  1082. }
  1083. /* Erase last character (might be either & or ?) */
  1084. rspamd_fstring_erase (new_url, new_url->len - 1, 1);
  1085. rspamd_fstring_free (msg->url);
  1086. msg->url = new_url;
  1087. session->fname = file_str;
  1088. }
  1089. g_hash_table_unref (query_args);
  1090. }
  1091. }
  1092. return TRUE;
  1093. }
  1094. static void
  1095. proxy_backend_mirror_error_handler (struct rspamd_http_connection *conn, GError *err)
  1096. {
  1097. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1098. struct rspamd_proxy_session *session;
  1099. session = bk_conn->s;
  1100. msg_info_session ("abnormally closing connection from backend: %s:%s, "
  1101. "error: %e",
  1102. bk_conn->name,
  1103. rspamd_inet_address_to_string (rspamd_upstream_addr (bk_conn->up)),
  1104. err);
  1105. if (err) {
  1106. bk_conn->err = rspamd_mempool_strdup (session->pool, err->message);
  1107. }
  1108. rspamd_upstream_fail (bk_conn->up, FALSE);
  1109. proxy_backend_close_connection (bk_conn);
  1110. REF_RELEASE (bk_conn->s);
  1111. }
  1112. static gint
  1113. proxy_backend_mirror_finish_handler (struct rspamd_http_connection *conn,
  1114. struct rspamd_http_message *msg)
  1115. {
  1116. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1117. struct rspamd_proxy_session *session;
  1118. session = bk_conn->s;
  1119. proxy_request_decompress (msg);
  1120. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  1121. bk_conn->parser_from_ref, msg->body_buf.begin, msg->body_buf.len)) {
  1122. msg_warn_session ("cannot parse results from the mirror backend %s:%s",
  1123. bk_conn->name,
  1124. rspamd_inet_address_to_string (rspamd_upstream_addr (bk_conn->up)));
  1125. bk_conn->err = "cannot parse ucl";
  1126. }
  1127. msg_info_session ("finished mirror connection to %s", bk_conn->name);
  1128. rspamd_upstream_ok (bk_conn->up);
  1129. proxy_backend_close_connection (bk_conn);
  1130. REF_RELEASE (bk_conn->s);
  1131. return 0;
  1132. }
  1133. static void
  1134. proxy_open_mirror_connections (struct rspamd_proxy_session *session)
  1135. {
  1136. gdouble coin;
  1137. struct rspamd_http_mirror *m;
  1138. guint i;
  1139. struct rspamd_proxy_backend_connection *bk_conn;
  1140. struct rspamd_http_message *msg;
  1141. GError *err = NULL;
  1142. coin = rspamd_random_double ();
  1143. for (i = 0; i < session->ctx->mirrors->len; i ++) {
  1144. m = g_ptr_array_index (session->ctx->mirrors, i);
  1145. if (m->prob < coin) {
  1146. /* No luck */
  1147. continue;
  1148. }
  1149. bk_conn = rspamd_mempool_alloc0 (session->pool,
  1150. sizeof (*bk_conn));
  1151. bk_conn->s = session;
  1152. bk_conn->name = m->name;
  1153. bk_conn->io_tv = &m->io_tv;
  1154. bk_conn->up = rspamd_upstream_get (m->u,
  1155. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1156. bk_conn->parser_from_ref = m->parser_from_ref;
  1157. bk_conn->parser_to_ref = m->parser_to_ref;
  1158. if (bk_conn->up == NULL) {
  1159. msg_err_session ("cannot select upstream for %s", m->name);
  1160. continue;
  1161. }
  1162. bk_conn->backend_sock = rspamd_inet_address_connect (
  1163. rspamd_upstream_addr (bk_conn->up),
  1164. SOCK_STREAM, TRUE);
  1165. if (bk_conn->backend_sock == -1) {
  1166. msg_err_session ("cannot connect upstream for %s", m->name);
  1167. rspamd_upstream_fail (bk_conn->up, TRUE);
  1168. continue;
  1169. }
  1170. msg = rspamd_http_connection_copy_msg (session->client_message, &err);
  1171. if (msg == NULL) {
  1172. msg_err_session ("cannot copy message to send to a mirror %s: %e",
  1173. m->name, err);
  1174. if (err) {
  1175. g_error_free (err);
  1176. }
  1177. continue;
  1178. }
  1179. if (msg->url->len == 0) {
  1180. msg->url = rspamd_fstring_append (msg->url, "/check", strlen ("/check"));
  1181. }
  1182. if (m->settings_id != NULL) {
  1183. rspamd_http_message_remove_header (msg, "Settings-ID");
  1184. rspamd_http_message_add_header (msg, "Settings-ID", m->settings_id);
  1185. }
  1186. bk_conn->backend_conn = rspamd_http_connection_new (NULL,
  1187. proxy_backend_mirror_error_handler,
  1188. proxy_backend_mirror_finish_handler,
  1189. RSPAMD_HTTP_CLIENT_SIMPLE,
  1190. RSPAMD_HTTP_CLIENT,
  1191. session->ctx->keys_cache,
  1192. NULL);
  1193. if (m->key) {
  1194. rspamd_http_connection_set_key (bk_conn->backend_conn,
  1195. session->ctx->local_key);
  1196. msg->peer_key = rspamd_pubkey_ref (m->key);
  1197. }
  1198. if (m->local ||
  1199. rspamd_inet_address_is_local (
  1200. rspamd_upstream_addr (bk_conn->up), FALSE)) {
  1201. if (session->fname) {
  1202. rspamd_http_message_add_header (msg, "File", session->fname);
  1203. }
  1204. msg->method = HTTP_GET;
  1205. rspamd_http_connection_write_message_shared (bk_conn->backend_conn,
  1206. msg, NULL, NULL, bk_conn,
  1207. bk_conn->backend_sock,
  1208. bk_conn->io_tv, session->ctx->ev_base);
  1209. }
  1210. else {
  1211. if (session->fname) {
  1212. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1213. rspamd_http_message_set_body (msg, session->map, session->map_len);
  1214. }
  1215. msg->method = HTTP_POST;
  1216. if (m->compress) {
  1217. proxy_request_compress (msg);
  1218. if (session->client_milter_conn) {
  1219. rspamd_http_message_add_header (msg, "Content-Type",
  1220. "application/octet-stream");
  1221. }
  1222. }
  1223. else {
  1224. if (session->client_milter_conn) {
  1225. rspamd_http_message_add_header (msg, "Content-Type",
  1226. "text/plain");
  1227. }
  1228. }
  1229. rspamd_http_connection_write_message (bk_conn->backend_conn,
  1230. msg, NULL, NULL, bk_conn,
  1231. bk_conn->backend_sock,
  1232. bk_conn->io_tv, session->ctx->ev_base);
  1233. }
  1234. g_ptr_array_add (session->mirror_conns, bk_conn);
  1235. REF_RETAIN (session);
  1236. msg_info_session ("send request to %s", m->name);
  1237. }
  1238. }
  1239. static void
  1240. proxy_client_write_error (struct rspamd_proxy_session *session, gint code,
  1241. const gchar *status)
  1242. {
  1243. struct rspamd_http_message *reply;
  1244. if (session->client_milter_conn) {
  1245. rspamd_milter_send_action (session->client_milter_conn,
  1246. RSPAMD_MILTER_TEMPFAIL);
  1247. REF_RELEASE (session);
  1248. }
  1249. else {
  1250. reply = rspamd_http_new_message (HTTP_RESPONSE);
  1251. reply->code = code;
  1252. reply->status = rspamd_fstring_new_init (status, strlen (status));
  1253. rspamd_http_connection_write_message (session->client_conn,
  1254. reply, NULL, NULL, session, session->client_sock,
  1255. &session->ctx->io_tv, session->ctx->ev_base);
  1256. }
  1257. }
  1258. static void
  1259. proxy_backend_master_error_handler (struct rspamd_http_connection *conn, GError *err)
  1260. {
  1261. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1262. struct rspamd_proxy_session *session;
  1263. session = bk_conn->s;
  1264. msg_info_session ("abnormally closing connection from backend: %s, error: %e,"
  1265. " retries left: %d",
  1266. rspamd_inet_address_to_string (rspamd_upstream_addr (session->master_conn->up)),
  1267. err,
  1268. session->ctx->max_retries - session->retries);
  1269. session->retries ++;
  1270. rspamd_upstream_fail (bk_conn->up, FALSE);
  1271. proxy_backend_close_connection (session->master_conn);
  1272. if (session->ctx->max_retries &&
  1273. session->retries > session->ctx->max_retries) {
  1274. msg_err_session ("cannot connect to upstream, maximum retries "
  1275. "has been reached: %d", session->retries);
  1276. /* Terminate session immediately */
  1277. proxy_client_write_error (session, err->code, err->message);
  1278. }
  1279. else {
  1280. if (!proxy_send_master_message (session)) {
  1281. proxy_client_write_error (session, err->code, err->message);
  1282. }
  1283. else {
  1284. msg_info_session ("retry connection to: %s"
  1285. " retries left: %d",
  1286. rspamd_inet_address_to_string (
  1287. rspamd_upstream_addr (session->master_conn->up)),
  1288. session->ctx->max_retries - session->retries);
  1289. }
  1290. }
  1291. }
  1292. static gint
  1293. proxy_backend_master_finish_handler (struct rspamd_http_connection *conn,
  1294. struct rspamd_http_message *msg)
  1295. {
  1296. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1297. struct rspamd_proxy_session *session, *nsession;
  1298. rspamd_fstring_t *reply;
  1299. session = bk_conn->s;
  1300. rspamd_http_connection_steal_msg (session->master_conn->backend_conn);
  1301. proxy_request_decompress (msg);
  1302. rspamd_http_message_remove_header (msg, "Content-Length");
  1303. rspamd_http_message_remove_header (msg, "Key");
  1304. rspamd_http_connection_reset (session->master_conn->backend_conn);
  1305. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  1306. bk_conn->parser_from_ref, msg->body_buf.begin, msg->body_buf.len)) {
  1307. msg_warn_session ("cannot parse results from the master backend");
  1308. }
  1309. if (session->legacy_support > LEGACY_SUPPORT_NO) {
  1310. /* We need to reformat ucl to fit with legacy spamc protocol */
  1311. if (bk_conn->results) {
  1312. reply = rspamd_fstring_new ();
  1313. if (session->legacy_support == LEGACY_SUPPORT_SPAMC) {
  1314. rspamd_ucl_tospamc_output (bk_conn->results, &reply);
  1315. msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
  1316. }
  1317. else {
  1318. rspamd_ucl_torspamc_output (bk_conn->results, &reply);
  1319. }
  1320. rspamd_http_message_set_body_from_fstring_steal (msg, reply);
  1321. msg->method = HTTP_SYMBOLS;
  1322. }
  1323. else {
  1324. msg_warn_session ("cannot parse results from the master backend, "
  1325. "return them as is");
  1326. }
  1327. }
  1328. rspamd_upstream_ok (bk_conn->up);
  1329. if (session->client_milter_conn) {
  1330. nsession = proxy_session_refresh (session);
  1331. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1332. session->master_conn->results);
  1333. REF_RELEASE (session);
  1334. rspamd_http_message_free (msg);
  1335. }
  1336. else {
  1337. rspamd_http_connection_write_message (session->client_conn,
  1338. msg, NULL, NULL, session, session->client_sock,
  1339. bk_conn->io_tv, session->ctx->ev_base);
  1340. }
  1341. return 0;
  1342. }
  1343. static void
  1344. rspamd_proxy_scan_self_reply (struct rspamd_task *task)
  1345. {
  1346. struct rspamd_http_message *msg;
  1347. struct rspamd_proxy_session *session = task->fin_arg, *nsession;
  1348. ucl_object_t *rep = NULL;
  1349. const char *ctype = "application/json";
  1350. msg = rspamd_http_new_message (HTTP_RESPONSE);
  1351. msg->date = time (NULL);
  1352. msg->code = 200;
  1353. switch (task->cmd) {
  1354. case CMD_REPORT_IFSPAM:
  1355. case CMD_REPORT:
  1356. case CMD_CHECK:
  1357. case CMD_SYMBOLS:
  1358. case CMD_PROCESS:
  1359. case CMD_SKIP:
  1360. case CMD_CHECK_V2:
  1361. rspamd_task_set_finish_time (task);
  1362. rspamd_protocol_http_reply (msg, task, &rep);
  1363. rspamd_protocol_write_log_pipe (task);
  1364. break;
  1365. case CMD_PING:
  1366. rspamd_http_message_set_body (msg, "pong" CRLF, 6);
  1367. ctype = "text/plain";
  1368. break;
  1369. case CMD_OTHER:
  1370. msg_err_task ("BROKEN");
  1371. break;
  1372. }
  1373. session->master_conn->flags |= RSPAMD_BACKEND_CLOSED;
  1374. if (rep) {
  1375. session->master_conn->results = ucl_object_ref (rep);
  1376. }
  1377. if (session->client_milter_conn) {
  1378. nsession = proxy_session_refresh (session);
  1379. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1380. session->master_conn->results);
  1381. rspamd_http_message_free (msg);
  1382. REF_RELEASE (session);
  1383. }
  1384. else {
  1385. rspamd_http_connection_reset (session->client_conn);
  1386. rspamd_http_connection_write_message (session->client_conn,
  1387. msg,
  1388. NULL,
  1389. ctype,
  1390. session,
  1391. session->client_sock,
  1392. NULL,
  1393. session->ctx->ev_base);
  1394. }
  1395. }
  1396. static gboolean
  1397. rspamd_proxy_task_fin (void *ud)
  1398. {
  1399. struct rspamd_task *task = ud;
  1400. msg_debug_task ("finish task");
  1401. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  1402. rspamd_proxy_scan_self_reply (task);
  1403. return TRUE;
  1404. }
  1405. if (!rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL)) {
  1406. rspamd_proxy_scan_self_reply (task);
  1407. return TRUE;
  1408. }
  1409. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  1410. rspamd_proxy_scan_self_reply (task);
  1411. return TRUE;
  1412. }
  1413. /* One more iteration */
  1414. return FALSE;
  1415. }
  1416. static gboolean
  1417. rspamd_proxy_self_scan (struct rspamd_proxy_session *session)
  1418. {
  1419. struct rspamd_task *task;
  1420. struct rspamd_http_message *msg;
  1421. const gchar *data;
  1422. gsize len;
  1423. msg = session->client_message;
  1424. task = rspamd_task_new (session->worker, session->ctx->cfg,
  1425. session->pool, session->ctx->lang_det);
  1426. task->flags |= RSPAMD_TASK_FLAG_MIME;
  1427. task->sock = -1;
  1428. if (session->client_milter_conn) {
  1429. task->client_addr = rspamd_inet_address_copy (
  1430. session->client_milter_conn->addr);
  1431. }
  1432. else {
  1433. task->client_addr = rspamd_inet_address_copy (session->client_addr);
  1434. }
  1435. task->fin_arg = session;
  1436. task->resolver = session->ctx->resolver;
  1437. /* TODO: allow to disable autolearn in protocol */
  1438. task->flags |= RSPAMD_TASK_FLAG_LEARN_AUTO;
  1439. task->ev_base = session->ctx->ev_base;
  1440. task->s = rspamd_session_create (task->task_pool, rspamd_proxy_task_fin,
  1441. NULL, (event_finalizer_t )rspamd_task_free, task);
  1442. data = rspamd_http_message_get_body (msg, &len);
  1443. if (session->backend->settings_id) {
  1444. rspamd_http_message_remove_header (msg, "Settings-ID");
  1445. rspamd_http_message_add_header (msg, "Settings-ID",
  1446. session->backend->settings_id);
  1447. }
  1448. /* Process message */
  1449. if (!rspamd_protocol_handle_request (task, msg)) {
  1450. msg_err_task ("cannot handle request: %e", task->err);
  1451. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1452. }
  1453. else {
  1454. if (task->cmd == CMD_PING) {
  1455. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1456. }
  1457. else {
  1458. if (!rspamd_task_load_message (task, msg, data, len)) {
  1459. msg_err_task ("cannot load message: %e", task->err);
  1460. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1461. }
  1462. }
  1463. }
  1464. /* Set global timeout for the task */
  1465. if (session->ctx->default_upstream->timeout > 0.0) {
  1466. struct timeval task_tv;
  1467. event_set (&task->timeout_ev, -1, EV_TIMEOUT, rspamd_task_timeout,
  1468. task);
  1469. event_base_set (session->ctx->ev_base, &task->timeout_ev);
  1470. double_to_tv (session->ctx->default_upstream->timeout, &task_tv);
  1471. event_add (&task->timeout_ev, &task_tv);
  1472. }
  1473. session->master_conn->task = task;
  1474. rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL);
  1475. rspamd_session_pending (task->s);
  1476. return TRUE;
  1477. }
  1478. static gboolean
  1479. proxy_send_master_message (struct rspamd_proxy_session *session)
  1480. {
  1481. struct rspamd_http_message *msg;
  1482. struct rspamd_http_upstream *backend = NULL;
  1483. const rspamd_ftok_t *host;
  1484. GError *err = NULL;
  1485. gchar hostbuf[512];
  1486. host = rspamd_http_message_find_header (session->client_message, "Host");
  1487. if (host == NULL) {
  1488. backend = session->ctx->default_upstream;
  1489. }
  1490. else {
  1491. rspamd_strlcpy (hostbuf, host->begin, MIN(host->len + 1, sizeof (hostbuf)));
  1492. backend = g_hash_table_lookup (session->ctx->upstreams, hostbuf);
  1493. if (backend == NULL) {
  1494. backend = session->ctx->default_upstream;
  1495. }
  1496. }
  1497. if (backend == NULL) {
  1498. /* No backend */
  1499. msg_err_session ("cannot find upstream for %s", host ? hostbuf : "default");
  1500. goto err;
  1501. }
  1502. else {
  1503. session->backend = backend;
  1504. if (backend->self_scan) {
  1505. return rspamd_proxy_self_scan (session);
  1506. }
  1507. retry:
  1508. if (session->ctx->max_retries &&
  1509. session->retries > session->ctx->max_retries) {
  1510. msg_err_session ("cannot connect to upstream, maximum retries "
  1511. "has been reached: %d", session->retries);
  1512. goto err;
  1513. }
  1514. session->master_conn->up = rspamd_upstream_get (backend->u,
  1515. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1516. session->master_conn->io_tv = &backend->io_tv;
  1517. if (session->master_conn->up == NULL) {
  1518. msg_err_session ("cannot select upstream for %s",
  1519. host ? hostbuf : "default");
  1520. goto err;
  1521. }
  1522. session->master_conn->backend_sock = rspamd_inet_address_connect (
  1523. rspamd_upstream_addr (session->master_conn->up),
  1524. SOCK_STREAM, TRUE);
  1525. if (session->master_conn->backend_sock == -1) {
  1526. msg_err_session ("cannot connect upstream: %s(%s)",
  1527. host ? hostbuf : "default",
  1528. rspamd_inet_address_to_string (rspamd_upstream_addr (
  1529. session->master_conn->up)));
  1530. rspamd_upstream_fail (session->master_conn->up, TRUE);
  1531. session->retries ++;
  1532. goto retry;
  1533. }
  1534. msg = rspamd_http_connection_copy_msg (session->client_message, &err);
  1535. if (msg == NULL) {
  1536. msg_err_session ("cannot copy message to send it to the upstream: %e",
  1537. err);
  1538. if (err) {
  1539. g_error_free (err);
  1540. }
  1541. goto err; /* No fallback here */
  1542. }
  1543. session->master_conn->backend_conn = rspamd_http_connection_new (
  1544. NULL,
  1545. proxy_backend_master_error_handler,
  1546. proxy_backend_master_finish_handler,
  1547. RSPAMD_HTTP_CLIENT_SIMPLE,
  1548. RSPAMD_HTTP_CLIENT,
  1549. session->ctx->keys_cache,
  1550. NULL);
  1551. session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED;
  1552. session->master_conn->parser_from_ref = backend->parser_from_ref;
  1553. session->master_conn->parser_to_ref = backend->parser_to_ref;
  1554. if (backend->key) {
  1555. msg->peer_key = rspamd_pubkey_ref (backend->key);
  1556. rspamd_http_connection_set_key (session->master_conn->backend_conn,
  1557. session->ctx->local_key);
  1558. }
  1559. if (backend->settings_id != NULL) {
  1560. rspamd_http_message_remove_header (msg, "Settings-ID");
  1561. rspamd_http_message_add_header (msg, "Settings-ID",
  1562. backend->settings_id);
  1563. }
  1564. if (backend->local ||
  1565. rspamd_inet_address_is_local (
  1566. rspamd_upstream_addr (session->master_conn->up), FALSE)) {
  1567. if (session->fname) {
  1568. rspamd_http_message_add_header (msg, "File", session->fname);
  1569. }
  1570. msg->method = HTTP_GET;
  1571. rspamd_http_connection_write_message_shared (
  1572. session->master_conn->backend_conn,
  1573. msg, NULL, NULL, session->master_conn,
  1574. session->master_conn->backend_sock,
  1575. session->master_conn->io_tv, session->ctx->ev_base);
  1576. }
  1577. else {
  1578. if (session->fname) {
  1579. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1580. rspamd_http_message_set_body (msg,
  1581. session->map, session->map_len);
  1582. }
  1583. msg->method = HTTP_POST;
  1584. if (backend->compress) {
  1585. proxy_request_compress (msg);
  1586. if (session->client_milter_conn) {
  1587. rspamd_http_message_add_header (msg, "Content-Type",
  1588. "application/octet-stream");
  1589. }
  1590. }
  1591. else {
  1592. if (session->client_milter_conn) {
  1593. rspamd_http_message_add_header (msg, "Content-Type",
  1594. "text/plain");
  1595. }
  1596. }
  1597. rspamd_http_connection_write_message (
  1598. session->master_conn->backend_conn,
  1599. msg, NULL, NULL, session->master_conn,
  1600. session->master_conn->backend_sock,
  1601. session->master_conn->io_tv, session->ctx->ev_base);
  1602. }
  1603. }
  1604. return TRUE;
  1605. err:
  1606. if (session->client_milter_conn) {
  1607. rspamd_milter_send_action (session->client_milter_conn,
  1608. RSPAMD_MILTER_TEMPFAIL);
  1609. REF_RELEASE (session);
  1610. }
  1611. else {
  1612. rspamd_http_connection_steal_msg (session->client_conn);
  1613. rspamd_http_connection_reset (session->client_conn);
  1614. proxy_client_write_error (session, 404, "Backend not found");
  1615. }
  1616. return FALSE;
  1617. }
  1618. static void
  1619. proxy_client_error_handler (struct rspamd_http_connection *conn, GError *err)
  1620. {
  1621. struct rspamd_proxy_session *session = conn->ud;
  1622. msg_info_session ("abnormally closing connection from: %s, error: %s",
  1623. rspamd_inet_address_to_string (session->client_addr), err->message);
  1624. /* Terminate session immediately */
  1625. proxy_backend_close_connection (session->master_conn);
  1626. REF_RELEASE (session);
  1627. }
  1628. static gint
  1629. proxy_client_finish_handler (struct rspamd_http_connection *conn,
  1630. struct rspamd_http_message *msg)
  1631. {
  1632. struct rspamd_proxy_session *session = conn->ud;
  1633. if (!session->master_conn) {
  1634. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1635. sizeof (*session->master_conn));
  1636. session->master_conn->s = session;
  1637. session->master_conn->name = "master";
  1638. /* Reset spamc legacy */
  1639. if (msg->method >= HTTP_SYMBOLS) {
  1640. msg->method = HTTP_POST;
  1641. if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) {
  1642. session->legacy_support = LEGACY_SUPPORT_SPAMC;
  1643. msg_info_session ("enabling legacy spamc mode for session");
  1644. }
  1645. else {
  1646. session->legacy_support = LEGACY_SUPPORT_RSPAMC;
  1647. msg_info_session ("enabling legacy rspamc mode for session");
  1648. }
  1649. }
  1650. if (msg->url->len == 0) {
  1651. msg->url = rspamd_fstring_append (msg->url,
  1652. "/" MSG_CMD_CHECK_V2, strlen ("/" MSG_CMD_CHECK_V2));
  1653. }
  1654. if (!proxy_check_file (msg, session)) {
  1655. goto err;
  1656. }
  1657. session->client_message = rspamd_http_connection_steal_msg (
  1658. session->client_conn);
  1659. session->shmem_ref = rspamd_http_message_shmem_ref (session->client_message);
  1660. rspamd_http_message_remove_header (msg, "Content-Length");
  1661. rspamd_http_message_remove_header (msg, "Transfer-Encoding");
  1662. rspamd_http_message_remove_header (msg, "Keep-Alive");
  1663. rspamd_http_message_remove_header (msg, "Connection");
  1664. rspamd_http_message_remove_header (msg, "Key");
  1665. proxy_open_mirror_connections (session);
  1666. rspamd_http_connection_reset (session->client_conn);
  1667. proxy_send_master_message (session);
  1668. }
  1669. else {
  1670. msg_info_session ("finished master connection");
  1671. proxy_backend_close_connection (session->master_conn);
  1672. REF_RELEASE (session);
  1673. }
  1674. return 0;
  1675. err:
  1676. rspamd_http_connection_steal_msg (session->client_conn);
  1677. rspamd_http_message_remove_header (msg, "Content-Length");
  1678. rspamd_http_message_remove_header (msg, "Key");
  1679. rspamd_http_message_remove_header (msg, "Transfer-Encoding");
  1680. rspamd_http_message_remove_header (msg, "Keep-Alive");
  1681. rspamd_http_message_remove_header (msg, "Connection");
  1682. rspamd_http_connection_reset (session->client_conn);
  1683. proxy_client_write_error (session, 404, "Backend not found");
  1684. return 0;
  1685. }
  1686. static void
  1687. proxy_milter_finish_handler (gint fd,
  1688. struct rspamd_milter_session *rms,
  1689. void *ud)
  1690. {
  1691. struct rspamd_proxy_session *session = ud;
  1692. struct rspamd_http_message *msg;
  1693. session->client_milter_conn = rms;
  1694. if (rms->message == NULL || rms->message->len == 0) {
  1695. msg_info_session ("finished milter connection");
  1696. proxy_backend_close_connection (session->master_conn);
  1697. REF_RELEASE (session);
  1698. }
  1699. else {
  1700. if (!session->master_conn) {
  1701. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1702. sizeof (*session->master_conn));
  1703. }
  1704. msg = rspamd_milter_to_http (rms);
  1705. session->master_conn->s = session;
  1706. session->master_conn->name = "master";
  1707. session->client_message = msg;
  1708. proxy_open_mirror_connections (session);
  1709. proxy_send_master_message (session);
  1710. }
  1711. }
  1712. static void
  1713. proxy_milter_error_handler (gint fd,
  1714. struct rspamd_milter_session *rms,
  1715. void *ud, GError *err)
  1716. {
  1717. struct rspamd_proxy_session *session = ud;
  1718. msg_info_session ("abnormally closing milter connection from: %s, "
  1719. "error: %s", rspamd_inet_address_to_string (session->client_addr),
  1720. err->message);
  1721. /* Terminate session immediately */
  1722. proxy_backend_close_connection (session->master_conn);
  1723. REF_RELEASE (session);
  1724. }
  1725. static void
  1726. proxy_accept_socket (gint fd, short what, void *arg)
  1727. {
  1728. struct rspamd_worker *worker = (struct rspamd_worker *) arg;
  1729. struct rspamd_proxy_ctx *ctx;
  1730. rspamd_inet_addr_t *addr;
  1731. struct rspamd_proxy_session *session;
  1732. gint nfd;
  1733. ctx = worker->ctx;
  1734. if ((nfd =
  1735. rspamd_accept_from_socket (fd, &addr, worker->accept_events)) == -1) {
  1736. msg_warn ("accept failed: %s", strerror (errno));
  1737. return;
  1738. }
  1739. /* Check for EAGAIN */
  1740. if (nfd == 0) {
  1741. return;
  1742. }
  1743. session = g_malloc0 (sizeof (*session));
  1744. REF_INIT_RETAIN (session, proxy_session_dtor);
  1745. session->client_sock = nfd;
  1746. session->client_addr = addr;
  1747. session->mirror_conns = g_ptr_array_sized_new (ctx->mirrors->len);
  1748. session->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (),
  1749. "proxy");
  1750. session->ctx = ctx;
  1751. session->worker = worker;
  1752. if (ctx->sessions_cache) {
  1753. rspamd_worker_session_cache_add (ctx->sessions_cache,
  1754. session->pool->tag.uid, &session->ref.refcount, session);
  1755. }
  1756. if (!ctx->milter) {
  1757. session->client_conn = rspamd_http_connection_new (NULL,
  1758. proxy_client_error_handler,
  1759. proxy_client_finish_handler,
  1760. 0,
  1761. RSPAMD_HTTP_SERVER,
  1762. ctx->keys_cache,
  1763. NULL);
  1764. if (ctx->key) {
  1765. rspamd_http_connection_set_key (session->client_conn, ctx->key);
  1766. }
  1767. msg_info_session ("accepted http connection from %s port %d",
  1768. rspamd_inet_address_to_string (addr),
  1769. rspamd_inet_address_get_port (addr));
  1770. rspamd_http_connection_read_message_shared (session->client_conn,
  1771. session,
  1772. nfd,
  1773. &ctx->io_tv,
  1774. ctx->ev_base);
  1775. }
  1776. else {
  1777. msg_info_session ("accepted milter connection from %s port %d",
  1778. rspamd_inet_address_to_string (addr),
  1779. rspamd_inet_address_get_port (addr));
  1780. #ifdef TCP_NODELAY
  1781. #ifndef SOL_TCP
  1782. #define SOL_TCP IPPROTO_TCP
  1783. #endif
  1784. if (rspamd_inet_address_get_af (addr) != AF_UNIX) {
  1785. gint sopt = 1;
  1786. if (setsockopt (nfd, SOL_TCP, TCP_NODELAY, &sopt, sizeof (sopt)) ==
  1787. -1) {
  1788. msg_warn_session ("cannot set TCP_NODELAY: %s",
  1789. strerror (errno));
  1790. }
  1791. }
  1792. #endif
  1793. rspamd_milter_handle_socket (nfd, NULL,
  1794. session->pool,
  1795. ctx->ev_base,
  1796. proxy_milter_finish_handler,
  1797. proxy_milter_error_handler,
  1798. session);
  1799. }
  1800. }
  1801. static void
  1802. proxy_rotate_key (gint fd, short what, void *arg)
  1803. {
  1804. struct timeval rot_tv;
  1805. struct rspamd_proxy_ctx *ctx = arg;
  1806. gpointer kp;
  1807. double_to_tv (ctx->rotate_tm, &rot_tv);
  1808. rot_tv.tv_sec += ottery_rand_range (rot_tv.tv_sec);
  1809. event_del (&ctx->rotate_ev);
  1810. event_add (&ctx->rotate_ev, &rot_tv);
  1811. kp = ctx->local_key;
  1812. ctx->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
  1813. RSPAMD_CRYPTOBOX_MODE_25519);
  1814. rspamd_keypair_unref (kp);
  1815. }
  1816. void
  1817. start_rspamd_proxy (struct rspamd_worker *worker) {
  1818. struct rspamd_proxy_ctx *ctx = worker->ctx;
  1819. struct timeval rot_tv;
  1820. ctx->cfg = worker->srv->cfg;
  1821. ctx->ev_base = rspamd_prepare_worker (worker, "rspamd_proxy",
  1822. proxy_accept_socket);
  1823. ctx->resolver = dns_resolver_init (worker->srv->logger,
  1824. ctx->ev_base,
  1825. worker->srv->cfg);
  1826. double_to_tv (ctx->timeout, &ctx->io_tv);
  1827. rspamd_map_watch (worker->srv->cfg, ctx->ev_base, ctx->resolver, worker, 0);
  1828. rspamd_upstreams_library_config (worker->srv->cfg, ctx->cfg->ups_ctx,
  1829. ctx->ev_base, ctx->resolver->r);
  1830. /* XXX: stupid default */
  1831. ctx->keys_cache = rspamd_keypair_cache_new (256);
  1832. ctx->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
  1833. RSPAMD_CRYPTOBOX_MODE_25519);
  1834. double_to_tv (ctx->rotate_tm, &rot_tv);
  1835. rot_tv.tv_sec += ottery_rand_range (rot_tv.tv_sec);
  1836. event_set (&ctx->rotate_ev, -1, EV_TIMEOUT, proxy_rotate_key, ctx);
  1837. event_base_set (ctx->ev_base, &ctx->rotate_ev);
  1838. event_add (&ctx->rotate_ev, &rot_tv);
  1839. if (ctx->has_self_scan) {
  1840. /* Additional initialisation needed */
  1841. rspamd_worker_init_scanner (worker, ctx->ev_base, ctx->resolver,
  1842. &ctx->lang_det);
  1843. }
  1844. if (worker->srv->cfg->enable_sessions_cache) {
  1845. ctx->sessions_cache = rspamd_worker_session_cache_new (worker,
  1846. ctx->ev_base);
  1847. }
  1848. ctx->milter_ctx.spam_header = ctx->spam_header;
  1849. ctx->milter_ctx.discard_on_reject = ctx->discard_on_reject;
  1850. ctx->milter_ctx.quarantine_on_reject = ctx->quarantine_on_reject;
  1851. ctx->milter_ctx.sessions_cache = ctx->sessions_cache;
  1852. ctx->milter_ctx.client_ca_name = ctx->client_ca_name;
  1853. ctx->milter_ctx.reject_message = ctx->reject_message;
  1854. rspamd_milter_init_library (&ctx->milter_ctx);
  1855. rspamd_lua_run_postloads (ctx->cfg->lua_state, ctx->cfg, ctx->ev_base,
  1856. worker);
  1857. event_base_loop (ctx->ev_base, 0);
  1858. rspamd_worker_block_signals ();
  1859. if (ctx->has_self_scan) {
  1860. rspamd_stat_close ();
  1861. }
  1862. rspamd_keypair_cache_destroy (ctx->keys_cache);
  1863. REF_RELEASE (ctx->cfg);
  1864. rspamd_log_close (worker->srv->logger, TRUE);
  1865. exit (EXIT_SUCCESS);
  1866. }