You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd_proxy.c 61KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "libutil/util.h"
  18. #include "libserver/maps/map.h"
  19. #include "libutil/upstream.h"
  20. #include "libserver/http/http_connection.h"
  21. #include "libserver/http/http_private.h"
  22. #include "libserver/protocol.h"
  23. #include "libserver/protocol_internal.h"
  24. #include "libserver/cfg_file.h"
  25. #include "libserver/url.h"
  26. #include "libserver/dns.h"
  27. #include "libmime/message.h"
  28. #include "rspamd.h"
  29. #include "libserver/worker_util.h"
  30. #include "worker_private.h"
  31. #include "lua/lua_common.h"
  32. #include "keypairs_cache.h"
  33. #include "libstat/stat_api.h"
  34. #include "ottery.h"
  35. #include "unix-std.h"
  36. #include "libserver/milter.h"
  37. #include "libserver/milter_internal.h"
  38. #include "libmime/lang_detection.h"
  39. #include "contrib/zstd/zstd.h"
  40. #include <math.h>
  41. #ifdef HAVE_NETINET_TCP_H
  42. #include <netinet/tcp.h> /* for TCP_NODELAY */
  43. #endif
  44. /* Rotate keys each minute by default */
  45. #define DEFAULT_ROTATION_TIME 60.0
  46. #define DEFAULT_RETRIES 5
  47. #define msg_err_session(...) rspamd_default_log_function (G_LOG_LEVEL_CRITICAL, \
  48. session->pool->tag.tagname, session->pool->tag.uid, \
  49. G_STRFUNC, \
  50. __VA_ARGS__)
  51. #define msg_warn_session(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  52. session->pool->tag.tagname, session->pool->tag.uid, \
  53. G_STRFUNC, \
  54. __VA_ARGS__)
  55. #define msg_info_session(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  56. session->pool->tag.tagname, session->pool->tag.uid, \
  57. G_STRFUNC, \
  58. __VA_ARGS__)
  59. #define msg_debug_session(...) rspamd_conditional_debug_fast (NULL, session->client_addr, \
  60. rspamd_proxy_log_id, "proxy", session->pool->tag.uid, \
  61. G_STRFUNC, \
  62. __VA_ARGS__)
  63. INIT_LOG_MODULE(proxy)
  64. gpointer init_rspamd_proxy (struct rspamd_config *cfg);
  65. void start_rspamd_proxy (struct rspamd_worker *worker);
  66. worker_t rspamd_proxy_worker = {
  67. "rspamd_proxy", /* Name */
  68. init_rspamd_proxy, /* Init function */
  69. start_rspamd_proxy, /* Start function */
  70. RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE | RSPAMD_WORKER_SCANNER,
  71. RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */
  72. RSPAMD_WORKER_VER
  73. };
  74. struct rspamd_http_upstream {
  75. gchar *name;
  76. gchar *settings_id;
  77. struct upstream_list *u;
  78. struct rspamd_cryptobox_pubkey *key;
  79. gdouble timeout;
  80. gint parser_from_ref;
  81. gint parser_to_ref;
  82. gboolean local;
  83. gboolean self_scan;
  84. gboolean compress;
  85. };
  86. struct rspamd_http_mirror {
  87. gchar *name;
  88. gchar *settings_id;
  89. struct upstream_list *u;
  90. struct rspamd_cryptobox_pubkey *key;
  91. gdouble prob;
  92. gdouble timeout;
  93. gint parser_from_ref;
  94. gint parser_to_ref;
  95. gboolean local;
  96. gboolean compress;
  97. };
  98. static const guint64 rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL;
  99. struct rspamd_proxy_ctx {
  100. guint64 magic;
  101. /* Events base */
  102. struct ev_loop *event_loop;
  103. /* DNS resolver */
  104. struct rspamd_dns_resolver *resolver;
  105. /* Config */
  106. struct rspamd_config *cfg;
  107. /* END OF COMMON PART */
  108. gdouble timeout;
  109. /* Encryption key for clients */
  110. struct rspamd_cryptobox_keypair *key;
  111. /* HTTP context */
  112. struct rspamd_http_context *http_ctx;
  113. /* Upstreams to use */
  114. GHashTable *upstreams;
  115. /* Mirrors to send traffic to */
  116. GPtrArray *mirrors;
  117. /* Default upstream */
  118. struct rspamd_http_upstream *default_upstream;
  119. lua_State *lua_state;
  120. /* Array of callback functions called on end of scan to compare results */
  121. GArray *cmp_refs;
  122. /* Maximum count for retries */
  123. guint max_retries;
  124. /* If we have self_scanning backends, we need to work as a normal worker */
  125. gboolean has_self_scan;
  126. /* It is not HTTP but milter proxy */
  127. gboolean milter;
  128. /* Discard messages instead of rejecting them */
  129. gboolean discard_on_reject;
  130. /* Quarantine messages instead of rejecting them */
  131. gboolean quarantine_on_reject;
  132. /* Milter spam header */
  133. gchar *spam_header;
  134. /* CA name that can be used for client certificates */
  135. gchar *client_ca_name;
  136. /* Milter rejection message */
  137. gchar *reject_message;
  138. /* Sessions cache */
  139. void *sessions_cache;
  140. struct rspamd_milter_context milter_ctx;
  141. /* Language detector */
  142. struct rspamd_lang_detector *lang_det;
  143. };
  144. enum rspamd_backend_flags {
  145. RSPAMD_BACKEND_REPLIED = 1 << 0,
  146. RSPAMD_BACKEND_CLOSED = 1 << 1,
  147. RSPAMD_BACKEND_PARSED = 1 << 2,
  148. };
  149. struct rspamd_proxy_session;
  150. struct rspamd_proxy_backend_connection {
  151. const gchar *name;
  152. struct rspamd_cryptobox_keypair *local_key;
  153. struct rspamd_cryptobox_pubkey *remote_key;
  154. struct upstream *up;
  155. struct rspamd_http_connection *backend_conn;
  156. ucl_object_t *results;
  157. const gchar *err;
  158. struct rspamd_proxy_session *s;
  159. gint backend_sock;
  160. ev_tstamp timeout;
  161. enum rspamd_backend_flags flags;
  162. gint parser_from_ref;
  163. gint parser_to_ref;
  164. struct rspamd_task *task;
  165. };
  166. enum rspamd_proxy_legacy_support {
  167. LEGACY_SUPPORT_NO = 0,
  168. LEGACY_SUPPORT_RSPAMC,
  169. LEGACY_SUPPORT_SPAMC
  170. };
  171. struct rspamd_proxy_session {
  172. struct rspamd_worker *worker;
  173. rspamd_mempool_t *pool;
  174. struct rspamd_proxy_ctx *ctx;
  175. rspamd_inet_addr_t *client_addr;
  176. struct rspamd_http_connection *client_conn;
  177. struct rspamd_milter_session *client_milter_conn;
  178. struct rspamd_http_upstream *backend;
  179. gpointer map;
  180. gchar *fname;
  181. gpointer shmem_ref;
  182. struct rspamd_proxy_backend_connection *master_conn;
  183. struct rspamd_http_message *client_message;
  184. GPtrArray *mirror_conns;
  185. gsize map_len;
  186. gint client_sock;
  187. enum rspamd_proxy_legacy_support legacy_support;
  188. gint retries;
  189. ref_entry_t ref;
  190. };
  191. static gboolean proxy_send_master_message (struct rspamd_proxy_session *session);
  192. static GQuark
  193. rspamd_proxy_quark (void)
  194. {
  195. return g_quark_from_static_string ("rspamd-proxy");
  196. }
  197. static gboolean
  198. rspamd_proxy_parse_lua_parser (lua_State *L, const ucl_object_t *obj,
  199. gint *ref_from, gint *ref_to, GError **err)
  200. {
  201. const gchar *lua_script;
  202. gsize slen;
  203. gint err_idx, ref_idx;
  204. gboolean has_ref = FALSE;
  205. g_assert (obj != NULL);
  206. g_assert (ref_from != NULL);
  207. g_assert (ref_to != NULL);
  208. *ref_from = -1;
  209. *ref_to = -1;
  210. lua_script = ucl_object_tolstring (obj, &slen);
  211. lua_pushcfunction (L, &rspamd_lua_traceback);
  212. err_idx = lua_gettop (L);
  213. /* Load data */
  214. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  215. g_set_error (err,
  216. rspamd_proxy_quark (),
  217. EINVAL,
  218. "cannot load lua parser script: %s",
  219. lua_tostring (L, -1));
  220. lua_settop (L, 0); /* Error function */
  221. return FALSE;
  222. }
  223. /* Now do it */
  224. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  225. g_set_error (err,
  226. rspamd_proxy_quark (),
  227. EINVAL,
  228. "cannot init lua parser script: %s",
  229. lua_tostring (L, -1));
  230. lua_settop (L, 0);
  231. return FALSE;
  232. }
  233. if (lua_istable (L, -1)) {
  234. /*
  235. * We have a table, so we check for two keys:
  236. * 'from' -> function
  237. * 'to' -> function
  238. *
  239. * From converts parent request to a client one
  240. * To converts client request to a parent one
  241. */
  242. lua_pushstring (L, "from");
  243. lua_gettable (L, -2);
  244. if (lua_isfunction (L, -1)) {
  245. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  246. *ref_from = ref_idx;
  247. has_ref = TRUE;
  248. }
  249. lua_pushstring (L, "to");
  250. lua_gettable (L, -2);
  251. if (lua_isfunction (L, -1)) {
  252. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  253. *ref_to = ref_idx;
  254. has_ref = TRUE;
  255. }
  256. }
  257. else if (!lua_isfunction (L, -1)) {
  258. g_set_error (err,
  259. rspamd_proxy_quark (),
  260. EINVAL,
  261. "cannot init lua parser script: "
  262. "must return function");
  263. lua_settop (L, 0);
  264. return FALSE;
  265. }
  266. else {
  267. /* Just parser from protocol */
  268. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  269. *ref_from = ref_idx;
  270. lua_settop (L, 0);
  271. has_ref = TRUE;
  272. }
  273. return has_ref;
  274. }
  275. static gboolean
  276. rspamd_proxy_parse_upstream (rspamd_mempool_t *pool,
  277. const ucl_object_t *obj,
  278. gpointer ud,
  279. struct rspamd_rcl_section *section,
  280. GError **err)
  281. {
  282. const ucl_object_t *elt;
  283. struct rspamd_http_upstream *up = NULL;
  284. struct rspamd_proxy_ctx *ctx;
  285. struct rspamd_rcl_struct_parser *pd = ud;
  286. lua_State *L;
  287. ctx = pd->user_struct;
  288. L = ctx->lua_state;
  289. if (ucl_object_type (obj) != UCL_OBJECT) {
  290. g_set_error (err, rspamd_proxy_quark (), 100,
  291. "upstream option must be an object");
  292. return FALSE;
  293. }
  294. up = rspamd_mempool_alloc0 (pool, sizeof (*up));
  295. elt = ucl_object_lookup (obj, "name");
  296. if (elt == NULL) {
  297. if (ucl_object_key (obj)) {
  298. if (strcmp (ucl_object_key (obj), "upstream") == 0) {
  299. /* Iterate over the object and find upstream elements */
  300. ucl_object_iter_t it = NULL;
  301. const ucl_object_t *cur;
  302. gboolean ret = TRUE;
  303. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  304. if (!rspamd_proxy_parse_upstream (pool, cur, ud,
  305. section, err)) {
  306. ret = FALSE;
  307. }
  308. }
  309. return ret;
  310. }
  311. else {
  312. /* Inside upstream */
  313. up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
  314. }
  315. }
  316. else {
  317. g_set_error (err, rspamd_proxy_quark (), 100,
  318. "upstream option must have some name definition");
  319. return FALSE;
  320. }
  321. }
  322. else {
  323. up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  324. }
  325. up->parser_from_ref = -1;
  326. up->parser_to_ref = -1;
  327. up->timeout = ctx->timeout;
  328. elt = ucl_object_lookup (obj, "key");
  329. if (elt != NULL) {
  330. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  331. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  332. if (up->key == NULL) {
  333. g_set_error (err, rspamd_proxy_quark (), 100,
  334. "cannot read upstream key");
  335. goto err;
  336. }
  337. rspamd_mempool_add_destructor (pool,
  338. (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
  339. }
  340. elt = ucl_object_lookup (obj, "self_scan");
  341. if (elt && ucl_object_toboolean (elt)) {
  342. up->self_scan = TRUE;
  343. ctx->has_self_scan = TRUE;
  344. }
  345. elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
  346. if (elt && ucl_object_toboolean (elt)) {
  347. up->compress = TRUE;
  348. }
  349. elt = ucl_object_lookup (obj, "hosts");
  350. if (elt == NULL && !up->self_scan) {
  351. g_set_error (err, rspamd_proxy_quark (), 100,
  352. "upstream option must have some hosts definition");
  353. goto err;
  354. }
  355. if (elt) {
  356. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  357. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  358. g_set_error (err, rspamd_proxy_quark (), 100,
  359. "upstream has bad hosts definition");
  360. goto err;
  361. }
  362. rspamd_mempool_add_destructor (pool,
  363. (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
  364. }
  365. elt = ucl_object_lookup (obj, "default");
  366. if (elt) {
  367. if (ucl_object_toboolean (elt)) {
  368. ctx->default_upstream = up;
  369. }
  370. }
  371. else if (up->self_scan) {
  372. ctx->default_upstream = up;
  373. }
  374. elt = ucl_object_lookup (obj, "local");
  375. if (elt && ucl_object_toboolean (elt)) {
  376. up->local = TRUE;
  377. }
  378. elt = ucl_object_lookup (obj, "timeout");
  379. if (elt) {
  380. ucl_object_todouble_safe (elt, &up->timeout);
  381. }
  382. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  383. if (elt && ucl_object_type (elt) == UCL_STRING) {
  384. up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  385. }
  386. /*
  387. * Accept lua function here in form
  388. * fun :: String -> UCL
  389. */
  390. elt = ucl_object_lookup (obj, "parser");
  391. if (elt) {
  392. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  393. &up->parser_to_ref, err)) {
  394. goto err;
  395. }
  396. rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
  397. rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
  398. }
  399. g_hash_table_insert (ctx->upstreams, up->name, up);
  400. return TRUE;
  401. err:
  402. return FALSE;
  403. }
  404. static gboolean
  405. rspamd_proxy_parse_mirror (rspamd_mempool_t *pool,
  406. const ucl_object_t *obj,
  407. gpointer ud,
  408. struct rspamd_rcl_section *section,
  409. GError **err)
  410. {
  411. const ucl_object_t *elt;
  412. struct rspamd_http_mirror *up = NULL;
  413. struct rspamd_proxy_ctx *ctx;
  414. struct rspamd_rcl_struct_parser *pd = ud;
  415. lua_State *L;
  416. ctx = pd->user_struct;
  417. L = ctx->lua_state;
  418. if (ucl_object_type (obj) != UCL_OBJECT) {
  419. g_set_error (err, rspamd_proxy_quark (), 100,
  420. "mirror option must be an object");
  421. return FALSE;
  422. }
  423. up = rspamd_mempool_alloc0 (pool, sizeof (*up));
  424. elt = ucl_object_lookup (obj, "name");
  425. if (elt == NULL) {
  426. if (ucl_object_key (obj)) {
  427. if (strcmp (ucl_object_key (obj), "mirror") == 0) {
  428. /* Iterate over the object and find upstream elements */
  429. ucl_object_iter_t it = NULL;
  430. const ucl_object_t *cur;
  431. gboolean ret = TRUE;
  432. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  433. if (!rspamd_proxy_parse_mirror (pool, cur, ud,
  434. section, err)) {
  435. ret = FALSE;
  436. }
  437. }
  438. return ret;
  439. }
  440. else {
  441. /* Inside upstream */
  442. up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
  443. }
  444. }
  445. else {
  446. g_set_error (err, rspamd_proxy_quark (), 100,
  447. "mirror option must have some name definition");
  448. return FALSE;
  449. }
  450. }
  451. else {
  452. up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  453. }
  454. up->parser_to_ref = -1;
  455. up->parser_from_ref = -1;
  456. up->timeout = ctx->timeout;
  457. elt = ucl_object_lookup (obj, "key");
  458. if (elt != NULL) {
  459. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  460. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  461. if (up->key == NULL) {
  462. g_set_error (err, rspamd_proxy_quark (), 100,
  463. "cannot read mirror key");
  464. goto err;
  465. }
  466. rspamd_mempool_add_destructor (pool,
  467. (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
  468. }
  469. elt = ucl_object_lookup (obj, "hosts");
  470. if (elt == NULL) {
  471. g_set_error (err, rspamd_proxy_quark (), 100,
  472. "mirror option must have some hosts definition");
  473. goto err;
  474. }
  475. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  476. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  477. g_set_error (err, rspamd_proxy_quark (), 100,
  478. "mirror has bad hosts definition");
  479. goto err;
  480. }
  481. rspamd_mempool_add_destructor (pool,
  482. (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
  483. elt = ucl_object_lookup_any (obj, "probability", "prob", NULL);
  484. if (elt) {
  485. up->prob = ucl_object_todouble (elt);
  486. }
  487. else {
  488. up->prob = 1.0;
  489. }
  490. elt = ucl_object_lookup (obj, "local");
  491. if (elt && ucl_object_toboolean (elt)) {
  492. up->local = TRUE;
  493. }
  494. elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
  495. if (elt && ucl_object_toboolean (elt)) {
  496. up->compress = TRUE;
  497. }
  498. elt = ucl_object_lookup (obj, "timeout");
  499. if (elt) {
  500. ucl_object_todouble_safe (elt, &up->timeout);
  501. }
  502. /*
  503. * Accept lua function here in form
  504. * fun :: String -> UCL
  505. */
  506. elt = ucl_object_lookup (obj, "parser");
  507. if (elt) {
  508. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  509. &up->parser_to_ref, err)) {
  510. goto err;
  511. }
  512. rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
  513. rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
  514. }
  515. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  516. if (elt && ucl_object_type (elt) == UCL_STRING) {
  517. up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  518. }
  519. g_ptr_array_add (ctx->mirrors, up);
  520. return TRUE;
  521. err:
  522. return FALSE;
  523. }
  524. static gboolean
  525. rspamd_proxy_parse_script (rspamd_mempool_t *pool,
  526. const ucl_object_t *obj,
  527. gpointer ud,
  528. struct rspamd_rcl_section *section,
  529. GError **err)
  530. {
  531. struct rspamd_proxy_ctx *ctx;
  532. struct rspamd_rcl_struct_parser *pd = ud;
  533. lua_State *L;
  534. const gchar *lua_script;
  535. gsize slen;
  536. gint err_idx, ref_idx;
  537. struct stat st;
  538. ctx = pd->user_struct;
  539. L = ctx->lua_state;
  540. if (ucl_object_type (obj) != UCL_STRING) {
  541. g_set_error (err, rspamd_proxy_quark (), 100,
  542. "script option must be a string with file or lua chunk");
  543. return FALSE;
  544. }
  545. lua_script = ucl_object_tolstring (obj, &slen);
  546. lua_pushcfunction (L, &rspamd_lua_traceback);
  547. err_idx = lua_gettop (L);
  548. if (stat (lua_script, &st) != -1) {
  549. /* Load file */
  550. if (luaL_loadfile (L, lua_script) != 0) {
  551. g_set_error (err,
  552. rspamd_proxy_quark (),
  553. EINVAL,
  554. "cannot load lua parser script: %s",
  555. lua_tostring (L, -1));
  556. lua_settop (L, 0); /* Error function */
  557. goto err;
  558. }
  559. }
  560. else {
  561. /* Load data directly */
  562. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  563. g_set_error (err,
  564. rspamd_proxy_quark (),
  565. EINVAL,
  566. "cannot load lua parser script: %s",
  567. lua_tostring (L, -1));
  568. lua_settop (L, 0); /* Error function */
  569. goto err;
  570. }
  571. }
  572. /* Now do it */
  573. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  574. g_set_error (err,
  575. rspamd_proxy_quark (),
  576. EINVAL,
  577. "cannot init lua parser script: %s",
  578. lua_tostring (L, -1));
  579. lua_settop (L, 0);
  580. goto err;
  581. }
  582. if (!lua_isfunction (L, -1)) {
  583. g_set_error (err,
  584. rspamd_proxy_quark (),
  585. EINVAL,
  586. "cannot init lua parser script: "
  587. "must return function, %s returned",
  588. lua_typename (L, lua_type (L, -1)));
  589. lua_settop (L, 0);
  590. goto err;
  591. }
  592. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  593. lua_settop (L, 0);
  594. g_array_append_val (ctx->cmp_refs, ref_idx);
  595. return TRUE;
  596. err:
  597. return FALSE;
  598. }
  599. gpointer
  600. init_rspamd_proxy (struct rspamd_config *cfg)
  601. {
  602. struct rspamd_proxy_ctx *ctx;
  603. GQuark type;
  604. type = g_quark_try_string ("rspamd_proxy");
  605. ctx = rspamd_mempool_alloc0 (cfg->cfg_pool,
  606. sizeof (struct rspamd_proxy_ctx));
  607. ctx->magic = rspamd_rspamd_proxy_magic;
  608. ctx->timeout = 120.0;
  609. ctx->upstreams = g_hash_table_new (rspamd_strcase_hash, rspamd_strcase_equal);
  610. rspamd_mempool_add_destructor (cfg->cfg_pool,
  611. (rspamd_mempool_destruct_t)g_hash_table_unref, ctx->upstreams);
  612. ctx->mirrors = g_ptr_array_new ();
  613. rspamd_mempool_add_destructor (cfg->cfg_pool,
  614. (rspamd_mempool_destruct_t)rspamd_ptr_array_free_hard, ctx->mirrors);
  615. ctx->cfg = cfg;
  616. ctx->lua_state = cfg->lua_state;
  617. ctx->cmp_refs = g_array_new (FALSE, FALSE, sizeof (gint));
  618. rspamd_mempool_add_destructor (cfg->cfg_pool,
  619. (rspamd_mempool_destruct_t)rspamd_array_free_hard, ctx->cmp_refs);
  620. ctx->max_retries = DEFAULT_RETRIES;
  621. ctx->spam_header = RSPAMD_MILTER_SPAM_HEADER;
  622. rspamd_rcl_register_worker_option (cfg,
  623. type,
  624. "timeout",
  625. rspamd_rcl_parse_struct_time,
  626. ctx,
  627. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, timeout),
  628. RSPAMD_CL_FLAG_TIME_FLOAT,
  629. "IO timeout");
  630. rspamd_rcl_register_worker_option (cfg,
  631. type,
  632. "keypair",
  633. rspamd_rcl_parse_struct_keypair,
  634. ctx,
  635. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, key),
  636. 0,
  637. "Server's keypair");
  638. rspamd_rcl_register_worker_option (cfg,
  639. type,
  640. "upstream",
  641. rspamd_proxy_parse_upstream,
  642. ctx,
  643. 0,
  644. 0,
  645. "List of upstreams");
  646. rspamd_rcl_register_worker_option (cfg,
  647. type,
  648. "mirror",
  649. rspamd_proxy_parse_mirror,
  650. ctx,
  651. 0,
  652. RSPAMD_CL_FLAG_MULTIPLE,
  653. "List of mirrors");
  654. rspamd_rcl_register_worker_option (cfg,
  655. type,
  656. "script",
  657. rspamd_proxy_parse_script,
  658. ctx,
  659. 0,
  660. RSPAMD_CL_FLAG_MULTIPLE,
  661. "Compare script to be executed");
  662. rspamd_rcl_register_worker_option (cfg,
  663. type,
  664. "max_retries",
  665. rspamd_rcl_parse_struct_integer,
  666. ctx,
  667. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, max_retries),
  668. RSPAMD_CL_FLAG_UINT,
  669. "Maximum number of retries for master connection");
  670. rspamd_rcl_register_worker_option (cfg,
  671. type,
  672. "milter",
  673. rspamd_rcl_parse_struct_boolean,
  674. ctx,
  675. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, milter),
  676. 0,
  677. "Accept milter connections, not HTTP");
  678. rspamd_rcl_register_worker_option (cfg,
  679. type,
  680. "discard_on_reject",
  681. rspamd_rcl_parse_struct_boolean,
  682. ctx,
  683. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, discard_on_reject),
  684. 0,
  685. "Tell MTA to discard rejected messages silently");
  686. rspamd_rcl_register_worker_option (cfg,
  687. type,
  688. "quarantine_on_reject",
  689. rspamd_rcl_parse_struct_boolean,
  690. ctx,
  691. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, quarantine_on_reject),
  692. 0,
  693. "Tell MTA to quarantine rejected messages");
  694. rspamd_rcl_register_worker_option (cfg,
  695. type,
  696. "spam_header",
  697. rspamd_rcl_parse_struct_string,
  698. ctx,
  699. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, spam_header),
  700. 0,
  701. "Use the specific spam header (default: X-Spam)");
  702. rspamd_rcl_register_worker_option (cfg,
  703. type,
  704. "client_ca_name",
  705. rspamd_rcl_parse_struct_string,
  706. ctx,
  707. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, client_ca_name),
  708. 0,
  709. "Allow certificates issued by this CA to be treated as client certificates");
  710. rspamd_rcl_register_worker_option (cfg,
  711. type,
  712. "reject_message",
  713. rspamd_rcl_parse_struct_string,
  714. ctx,
  715. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, reject_message),
  716. 0,
  717. "Use custom rejection message");
  718. return ctx;
  719. }
  720. static void
  721. proxy_backend_close_connection (struct rspamd_proxy_backend_connection *conn)
  722. {
  723. if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  724. if (conn->backend_conn) {
  725. rspamd_http_connection_reset (conn->backend_conn);
  726. rspamd_http_connection_unref (conn->backend_conn);
  727. close (conn->backend_sock);
  728. }
  729. conn->flags |= RSPAMD_BACKEND_CLOSED;
  730. }
  731. }
  732. static gboolean
  733. proxy_backend_parse_results (struct rspamd_proxy_session *session,
  734. struct rspamd_proxy_backend_connection *conn,
  735. lua_State *L, gint parser_ref,
  736. struct rspamd_http_message *msg,
  737. goffset *body_offset,
  738. const rspamd_ftok_t *ct)
  739. {
  740. struct ucl_parser *parser;
  741. gint err_idx;
  742. const gchar *in = msg->body_buf.begin;
  743. gsize inlen = msg->body_buf.len;
  744. const rspamd_ftok_t *offset_hdr;
  745. if (inlen == 0 || in == NULL) {
  746. return FALSE;
  747. }
  748. offset_hdr = rspamd_http_message_find_header (msg, MESSAGE_OFFSET_HEADER);
  749. if (offset_hdr) {
  750. gulong val;
  751. if (rspamd_strtoul (offset_hdr->begin, offset_hdr->len, &val)
  752. && val < inlen) {
  753. if (body_offset) {
  754. *body_offset = val;
  755. }
  756. inlen = val;
  757. }
  758. }
  759. if (parser_ref != -1) {
  760. /* Call parser function */
  761. lua_pushcfunction (L, &rspamd_lua_traceback);
  762. err_idx = lua_gettop (L);
  763. lua_rawgeti (L, LUA_REGISTRYINDEX, parser_ref);
  764. /* XXX: copies all data */
  765. lua_pushlstring (L, in, inlen);
  766. if (lua_pcall (L, 1, 1, err_idx) != 0) {
  767. msg_err_session (
  768. "cannot run lua parser script: %s",
  769. lua_tostring (L, -1));
  770. lua_settop (L, 0);
  771. return FALSE;
  772. }
  773. conn->results = ucl_object_lua_import (L, -1);
  774. lua_settop (L, 0);
  775. }
  776. else {
  777. rspamd_ftok_t json_ct;
  778. RSPAMD_FTOK_ASSIGN (&json_ct, "application/json");
  779. if (ct && rspamd_ftok_casecmp (ct, &json_ct) == 0) {
  780. parser = ucl_parser_new (0);
  781. if (!ucl_parser_add_chunk (parser, in, inlen)) {
  782. gchar *encoded;
  783. encoded = rspamd_encode_base64 (in, inlen, 0, NULL);
  784. msg_err_session ("cannot parse input: %s", ucl_parser_get_error (
  785. parser));
  786. msg_err_session ("input encoded: %s", encoded);
  787. ucl_parser_free (parser);
  788. g_free (encoded);
  789. return FALSE;
  790. }
  791. conn->results = ucl_parser_get_object (parser);
  792. ucl_parser_free (parser);
  793. }
  794. }
  795. return TRUE;
  796. }
  797. static void
  798. proxy_call_cmp_script (struct rspamd_proxy_session *session, gint cbref)
  799. {
  800. gint err_idx;
  801. guint i;
  802. struct rspamd_proxy_backend_connection *conn;
  803. lua_State *L;
  804. L = session->ctx->lua_state;
  805. lua_pushcfunction (L, &rspamd_lua_traceback);
  806. err_idx = lua_gettop (L);
  807. lua_rawgeti (L, LUA_REGISTRYINDEX, cbref);
  808. lua_createtable (L, 0, session->mirror_conns->len + 1);
  809. /* Now push master results */
  810. if (session->master_conn && session->master_conn->results) {
  811. lua_pushstring (L, "master");
  812. ucl_object_push_lua (L, session->master_conn->results, true);
  813. lua_settable (L, -3);
  814. }
  815. else {
  816. lua_pushstring (L, "master");
  817. lua_pushstring (L, "no results");
  818. lua_settable (L, -3);
  819. }
  820. for (i = 0; i < session->mirror_conns->len; i ++) {
  821. conn = g_ptr_array_index (session->mirror_conns, i);
  822. if (conn->results) {
  823. lua_pushstring (L, conn->name);
  824. ucl_object_push_lua (L, conn->results, true);
  825. lua_settable (L, -3);
  826. }
  827. else {
  828. lua_pushstring (L, conn->name);
  829. lua_pushstring (L, conn->err ? conn->err : "unknown error");
  830. lua_settable (L, -3);
  831. }
  832. }
  833. if (lua_pcall (L, 1, 0, err_idx) != 0) {
  834. msg_err_session (
  835. "cannot run lua compare script: %s",
  836. lua_tostring (L, -1));
  837. }
  838. lua_settop (L, 0);
  839. }
  840. static void
  841. proxy_session_dtor (struct rspamd_proxy_session *session)
  842. {
  843. guint i;
  844. gint cbref;
  845. struct rspamd_proxy_backend_connection *conn;
  846. if (session->master_conn && session->master_conn->results) {
  847. for (i = 0; i < session->ctx->cmp_refs->len; i++) {
  848. cbref = g_array_index (session->ctx->cmp_refs, gint, i);
  849. proxy_call_cmp_script (session, cbref);
  850. }
  851. }
  852. if (session->master_conn) {
  853. proxy_backend_close_connection (session->master_conn);
  854. }
  855. if (session->client_milter_conn) {
  856. rspamd_milter_session_unref (session->client_milter_conn);
  857. }
  858. else if (session->client_conn) {
  859. rspamd_http_connection_reset (session->client_conn);
  860. rspamd_http_connection_unref (session->client_conn);
  861. }
  862. if (session->map && session->map_len) {
  863. munmap (session->map, session->map_len);
  864. }
  865. for (i = 0; i < session->mirror_conns->len; i ++) {
  866. conn = g_ptr_array_index (session->mirror_conns, i);
  867. if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  868. proxy_backend_close_connection (conn);
  869. }
  870. if (conn->results) {
  871. ucl_object_unref (conn->results);
  872. }
  873. }
  874. if (session->master_conn) {
  875. if (session->master_conn->results) {
  876. ucl_object_unref (session->master_conn->results);
  877. }
  878. if (session->master_conn->task) {
  879. rspamd_session_destroy (session->master_conn->task->s);
  880. }
  881. }
  882. g_ptr_array_free (session->mirror_conns, TRUE);
  883. rspamd_http_message_shmem_unref (session->shmem_ref);
  884. rspamd_http_message_unref (session->client_message);
  885. if (session->client_addr) {
  886. rspamd_inet_address_free (session->client_addr);
  887. }
  888. if (session->client_sock != -1) {
  889. close (session->client_sock);
  890. }
  891. if (session->ctx->sessions_cache) {
  892. rspamd_worker_session_cache_remove (session->ctx->sessions_cache,
  893. session);
  894. }
  895. if (session->pool) {
  896. rspamd_mempool_delete (session->pool);
  897. }
  898. g_free (session);
  899. }
  900. static void
  901. proxy_request_compress (struct rspamd_http_message *msg)
  902. {
  903. guint flags;
  904. ZSTD_CCtx *zctx;
  905. rspamd_fstring_t *body;
  906. const gchar *in;
  907. gsize inlen;
  908. flags = rspamd_http_message_get_flags (msg);
  909. if (!rspamd_http_message_find_header (msg, COMPRESSION_HEADER)) {
  910. if ((flags & RSPAMD_HTTP_FLAG_SHMEM) ||
  911. !(flags & RSPAMD_HTTP_FLAG_HAS_BODY)) {
  912. /* Cannot compress shared or empty message */
  913. return;
  914. }
  915. in = rspamd_http_message_get_body (msg, &inlen);
  916. if (in == NULL || inlen == 0) {
  917. return;
  918. }
  919. body = rspamd_fstring_sized_new (ZSTD_compressBound (inlen));
  920. zctx = ZSTD_createCCtx ();
  921. body->len = ZSTD_compressCCtx (zctx, body->str, body->allocated,
  922. in, inlen, 1);
  923. if (ZSTD_isError (body->len)) {
  924. msg_err ("compression error");
  925. rspamd_fstring_free (body);
  926. ZSTD_freeCCtx (zctx);
  927. return;
  928. }
  929. ZSTD_freeCCtx (zctx);
  930. rspamd_http_message_set_body_from_fstring_steal (msg, body);
  931. rspamd_http_message_add_header (msg, COMPRESSION_HEADER, "zstd");
  932. }
  933. }
  934. static void
  935. proxy_request_decompress (struct rspamd_http_message *msg)
  936. {
  937. rspamd_fstring_t *body;
  938. const gchar *in;
  939. gsize inlen, outlen, r;
  940. ZSTD_DStream *zstream;
  941. ZSTD_inBuffer zin;
  942. ZSTD_outBuffer zout;
  943. if (rspamd_http_message_find_header (msg, COMPRESSION_HEADER)) {
  944. in = rspamd_http_message_get_body (msg, &inlen);
  945. if (in == NULL || inlen == 0) {
  946. return;
  947. }
  948. zstream = ZSTD_createDStream ();
  949. ZSTD_initDStream (zstream);
  950. zin.pos = 0;
  951. zin.src = in;
  952. zin.size = inlen;
  953. if ((outlen = ZSTD_getDecompressedSize (zin.src, zin.size)) == 0) {
  954. outlen = ZSTD_DStreamOutSize ();
  955. }
  956. body = rspamd_fstring_sized_new (outlen);
  957. zout.dst = body->str;
  958. zout.pos = 0;
  959. zout.size = outlen;
  960. while (zin.pos < zin.size) {
  961. r = ZSTD_decompressStream (zstream, &zout, &zin);
  962. if (ZSTD_isError (r)) {
  963. msg_err ("Decompression error: %s", ZSTD_getErrorName (r));
  964. ZSTD_freeDStream (zstream);
  965. rspamd_fstring_free (body);
  966. return;
  967. }
  968. if (zout.pos == zout.size) {
  969. /* We need to extend output buffer */
  970. zout.size = zout.size * 2 + 1;
  971. body = rspamd_fstring_grow (body, zout.size);
  972. zout.size = body->allocated;
  973. zout.dst = body->str;
  974. }
  975. }
  976. body->len = zout.pos;
  977. ZSTD_freeDStream (zstream);
  978. rspamd_http_message_set_body_from_fstring_steal (msg, body);
  979. rspamd_http_message_remove_header (msg, COMPRESSION_HEADER);
  980. }
  981. }
  982. static struct rspamd_proxy_session *
  983. proxy_session_refresh (struct rspamd_proxy_session *session)
  984. {
  985. struct rspamd_proxy_session *nsession;
  986. nsession = g_malloc0 (sizeof (*nsession));
  987. nsession->client_milter_conn = session->client_milter_conn;
  988. session->client_milter_conn = NULL;
  989. rspamd_milter_update_userdata (nsession->client_milter_conn,
  990. nsession);
  991. nsession->client_addr = session->client_addr;
  992. session->client_addr = NULL;
  993. nsession->ctx = session->ctx;
  994. nsession->worker = session->worker;
  995. nsession->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (), "proxy", 0);
  996. nsession->client_sock = session->client_sock;
  997. session->client_sock = -1;
  998. nsession->mirror_conns = g_ptr_array_sized_new (nsession->ctx->mirrors->len);
  999. REF_INIT_RETAIN (nsession, proxy_session_dtor);
  1000. if (nsession->ctx->sessions_cache) {
  1001. rspamd_worker_session_cache_add (nsession->ctx->sessions_cache,
  1002. nsession->pool->tag.uid, &nsession->ref.refcount, nsession);
  1003. }
  1004. return nsession;
  1005. }
  1006. static gboolean
  1007. proxy_check_file (struct rspamd_http_message *msg,
  1008. struct rspamd_proxy_session *session)
  1009. {
  1010. const rspamd_ftok_t *tok, *key_tok;
  1011. rspamd_ftok_t srch;
  1012. gchar *file_str;
  1013. GHashTable *query_args;
  1014. GHashTableIter it;
  1015. gpointer k, v;
  1016. struct http_parser_url u;
  1017. rspamd_fstring_t *new_url;
  1018. tok = rspamd_http_message_find_header (msg, "File");
  1019. if (tok) {
  1020. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  1021. session->map = rspamd_file_xmap (file_str, PROT_READ, &session->map_len,
  1022. TRUE);
  1023. if (session->map == NULL) {
  1024. if (session->map_len != 0) {
  1025. msg_err_session ("cannot map %s: %s", file_str,
  1026. strerror (errno));
  1027. return FALSE;
  1028. }
  1029. }
  1030. /* Remove header after processing */
  1031. rspamd_http_message_remove_header (msg, "File");
  1032. session->fname = file_str;
  1033. }
  1034. else {
  1035. /* Need to parse query URL */
  1036. if (http_parser_parse_url (RSPAMD_FSTRING_DATA (msg->url),
  1037. RSPAMD_FSTRING_LEN (msg->url), 0, &u) != 0) {
  1038. msg_err_session ("bad request url: %V", msg->url);
  1039. return FALSE;
  1040. }
  1041. if (u.field_set & (1 << UF_QUERY)) {
  1042. /* In case if we have a query, we need to store it somewhere */
  1043. query_args = rspamd_http_message_parse_query (msg);
  1044. srch.begin = "File";
  1045. srch.len = strlen ("File");
  1046. tok = g_hash_table_lookup (query_args, &srch);
  1047. if (tok) {
  1048. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  1049. session->map = rspamd_file_xmap (file_str, PROT_READ,
  1050. &session->map_len, TRUE);
  1051. if (session->map == NULL) {
  1052. if (session->map_len != 0) {
  1053. msg_err_session ("cannot map %s: %s", file_str,
  1054. strerror (errno));
  1055. g_hash_table_unref (query_args);
  1056. return FALSE;
  1057. }
  1058. }
  1059. /* We need to create a new URL with file attribute removed */
  1060. new_url = rspamd_fstring_new_init (RSPAMD_FSTRING_DATA (msg->url),
  1061. u.field_data[UF_QUERY].off);
  1062. new_url = rspamd_fstring_append (new_url, "?", 1);
  1063. g_hash_table_iter_init (&it, query_args);
  1064. while (g_hash_table_iter_next (&it, &k, &v)) {
  1065. key_tok = k;
  1066. tok = v;
  1067. if (!rspamd_ftok_icase_equal (key_tok, &srch)) {
  1068. rspamd_printf_fstring (&new_url, "%T=%T&",
  1069. key_tok, tok);
  1070. }
  1071. }
  1072. /* Erase last character (might be either & or ?) */
  1073. rspamd_fstring_erase (new_url, new_url->len - 1, 1);
  1074. rspamd_fstring_free (msg->url);
  1075. msg->url = new_url;
  1076. session->fname = file_str;
  1077. }
  1078. g_hash_table_unref (query_args);
  1079. }
  1080. }
  1081. return TRUE;
  1082. }
  1083. static void
  1084. proxy_backend_mirror_error_handler (struct rspamd_http_connection *conn, GError *err)
  1085. {
  1086. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1087. struct rspamd_proxy_session *session;
  1088. session = bk_conn->s;
  1089. msg_info_session ("abnormally closing connection from backend: %s:%s, "
  1090. "error: %e",
  1091. bk_conn->name,
  1092. rspamd_inet_address_to_string_pretty (
  1093. rspamd_upstream_addr_cur (bk_conn->up)),
  1094. err);
  1095. if (err) {
  1096. bk_conn->err = rspamd_mempool_strdup (session->pool, err->message);
  1097. }
  1098. rspamd_upstream_fail (bk_conn->up, FALSE, err ? err->message : "unknown");
  1099. proxy_backend_close_connection (bk_conn);
  1100. REF_RELEASE (bk_conn->s);
  1101. }
  1102. static gint
  1103. proxy_backend_mirror_finish_handler (struct rspamd_http_connection *conn,
  1104. struct rspamd_http_message *msg)
  1105. {
  1106. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1107. struct rspamd_proxy_session *session;
  1108. const rspamd_ftok_t *orig_ct;
  1109. session = bk_conn->s;
  1110. proxy_request_decompress (msg);
  1111. orig_ct = rspamd_http_message_find_header (msg, "Content-Type");
  1112. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  1113. bk_conn->parser_from_ref, msg, NULL, orig_ct)) {
  1114. msg_warn_session ("cannot parse results from the mirror backend %s:%s",
  1115. bk_conn->name,
  1116. rspamd_inet_address_to_string (
  1117. rspamd_upstream_addr_cur (bk_conn->up)));
  1118. bk_conn->err = "cannot parse ucl";
  1119. }
  1120. msg_info_session ("finished mirror connection to %s", bk_conn->name);
  1121. rspamd_upstream_ok (bk_conn->up);
  1122. proxy_backend_close_connection (bk_conn);
  1123. REF_RELEASE (bk_conn->s);
  1124. return 0;
  1125. }
  1126. static void
  1127. proxy_open_mirror_connections (struct rspamd_proxy_session *session)
  1128. {
  1129. gdouble coin;
  1130. struct rspamd_http_mirror *m;
  1131. guint i;
  1132. struct rspamd_proxy_backend_connection *bk_conn;
  1133. struct rspamd_http_message *msg;
  1134. GError *err = NULL;
  1135. coin = rspamd_random_double ();
  1136. for (i = 0; i < session->ctx->mirrors->len; i ++) {
  1137. m = g_ptr_array_index (session->ctx->mirrors, i);
  1138. if (m->prob < coin) {
  1139. /* No luck */
  1140. continue;
  1141. }
  1142. bk_conn = rspamd_mempool_alloc0 (session->pool,
  1143. sizeof (*bk_conn));
  1144. bk_conn->s = session;
  1145. bk_conn->name = m->name;
  1146. bk_conn->timeout = m->timeout;
  1147. bk_conn->up = rspamd_upstream_get (m->u,
  1148. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1149. bk_conn->parser_from_ref = m->parser_from_ref;
  1150. bk_conn->parser_to_ref = m->parser_to_ref;
  1151. if (bk_conn->up == NULL) {
  1152. msg_err_session ("cannot select upstream for %s", m->name);
  1153. continue;
  1154. }
  1155. bk_conn->backend_sock = rspamd_inet_address_connect (
  1156. rspamd_upstream_addr_next (bk_conn->up),
  1157. SOCK_STREAM, TRUE);
  1158. if (bk_conn->backend_sock == -1) {
  1159. msg_err_session ("cannot connect upstream for %s", m->name);
  1160. rspamd_upstream_fail (bk_conn->up, TRUE, strerror (errno));
  1161. continue;
  1162. }
  1163. msg = rspamd_http_connection_copy_msg (session->client_message, &err);
  1164. if (msg == NULL) {
  1165. msg_err_session ("cannot copy message to send to a mirror %s: %e",
  1166. m->name, err);
  1167. if (err) {
  1168. g_error_free (err);
  1169. }
  1170. continue;
  1171. }
  1172. if (msg->url->len == 0) {
  1173. msg->url = rspamd_fstring_append (msg->url, "/check", strlen ("/check"));
  1174. }
  1175. if (m->settings_id != NULL) {
  1176. rspamd_http_message_remove_header (msg, "Settings-ID");
  1177. rspamd_http_message_add_header (msg, "Settings-ID", m->settings_id);
  1178. }
  1179. bk_conn->backend_conn = rspamd_http_connection_new_client_socket (
  1180. session->ctx->http_ctx,
  1181. NULL,
  1182. proxy_backend_mirror_error_handler,
  1183. proxy_backend_mirror_finish_handler,
  1184. RSPAMD_HTTP_CLIENT_SIMPLE,
  1185. bk_conn->backend_sock);
  1186. if (m->key) {
  1187. msg->peer_key = rspamd_pubkey_ref (m->key);
  1188. }
  1189. if (m->local ||
  1190. rspamd_inet_address_is_local (rspamd_upstream_addr_cur (bk_conn->up))) {
  1191. if (session->fname) {
  1192. rspamd_http_message_add_header (msg, "File", session->fname);
  1193. }
  1194. msg->method = HTTP_GET;
  1195. rspamd_http_connection_write_message_shared (bk_conn->backend_conn,
  1196. msg, NULL, NULL, bk_conn,
  1197. bk_conn->timeout);
  1198. }
  1199. else {
  1200. if (session->fname) {
  1201. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1202. rspamd_http_message_set_body (msg, session->map, session->map_len);
  1203. }
  1204. msg->method = HTTP_POST;
  1205. if (m->compress) {
  1206. proxy_request_compress (msg);
  1207. if (session->client_milter_conn) {
  1208. rspamd_http_message_add_header (msg, "Content-Type",
  1209. "application/octet-stream");
  1210. }
  1211. }
  1212. else {
  1213. if (session->client_milter_conn) {
  1214. rspamd_http_message_add_header (msg, "Content-Type",
  1215. "text/plain");
  1216. }
  1217. }
  1218. rspamd_http_connection_write_message (bk_conn->backend_conn,
  1219. msg, NULL, NULL, bk_conn,
  1220. bk_conn->timeout);
  1221. }
  1222. g_ptr_array_add (session->mirror_conns, bk_conn);
  1223. REF_RETAIN (session);
  1224. msg_info_session ("send request to %s", m->name);
  1225. }
  1226. }
  1227. static void
  1228. proxy_client_write_error (struct rspamd_proxy_session *session, gint code,
  1229. const gchar *status)
  1230. {
  1231. struct rspamd_http_message *reply;
  1232. if (session->client_milter_conn) {
  1233. rspamd_milter_send_action (session->client_milter_conn,
  1234. RSPAMD_MILTER_TEMPFAIL);
  1235. REF_RELEASE (session);
  1236. }
  1237. else {
  1238. reply = rspamd_http_new_message (HTTP_RESPONSE);
  1239. switch (code) {
  1240. case ETIMEDOUT:
  1241. reply->code = 504;
  1242. reply->status = RSPAMD_FSTRING_LIT ("Gateway timeout");
  1243. break;
  1244. case ECONNRESET:
  1245. case ECONNABORTED:
  1246. reply->code = 502;
  1247. reply->status = RSPAMD_FSTRING_LIT ("Gateway connection reset");
  1248. break;
  1249. case ECONNREFUSED:
  1250. reply->code = 502;
  1251. reply->status = RSPAMD_FSTRING_LIT ("Gateway connection refused");
  1252. break;
  1253. default:
  1254. if (code >= 300) {
  1255. /* Likely HTTP error */
  1256. reply->code = code;
  1257. reply->status = rspamd_fstring_new_init (status, strlen (status));
  1258. }
  1259. else {
  1260. reply->code = 502;
  1261. reply->status = RSPAMD_FSTRING_LIT ("Unknown gateway error: ");
  1262. reply->status = rspamd_fstring_append (reply->status,
  1263. status, strlen (status));
  1264. }
  1265. break;
  1266. }
  1267. rspamd_http_connection_write_message (session->client_conn,
  1268. reply, NULL, NULL, session,
  1269. session->ctx->timeout);
  1270. }
  1271. }
  1272. static void
  1273. proxy_backend_master_error_handler (struct rspamd_http_connection *conn, GError *err)
  1274. {
  1275. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1276. struct rspamd_proxy_session *session;
  1277. session = bk_conn->s;
  1278. session->retries ++;
  1279. msg_info_session ("abnormally closing connection from backend: %s, error: %e,"
  1280. " retries left: %d",
  1281. rspamd_inet_address_to_string_pretty (
  1282. rspamd_upstream_addr_cur (session->master_conn->up)),
  1283. err,
  1284. session->ctx->max_retries - session->retries);
  1285. rspamd_upstream_fail (bk_conn->up, FALSE, err ? err->message : "unknown");
  1286. proxy_backend_close_connection (session->master_conn);
  1287. if (session->ctx->max_retries > 0 &&
  1288. session->retries >= session->ctx->max_retries) {
  1289. msg_err_session ("cannot connect to upstream, maximum retries "
  1290. "has been reached: %d", session->retries);
  1291. /* Terminate session immediately */
  1292. proxy_client_write_error (session, err->code, err->message);
  1293. }
  1294. else {
  1295. if (!proxy_send_master_message (session)) {
  1296. proxy_client_write_error (session, err->code, err->message);
  1297. }
  1298. else {
  1299. msg_info_session ("retry connection to: %s"
  1300. " retries left: %d",
  1301. rspamd_inet_address_to_string (
  1302. rspamd_upstream_addr_cur (session->master_conn->up)),
  1303. session->ctx->max_retries - session->retries);
  1304. }
  1305. }
  1306. }
  1307. static gint
  1308. proxy_backend_master_finish_handler (struct rspamd_http_connection *conn,
  1309. struct rspamd_http_message *msg)
  1310. {
  1311. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1312. struct rspamd_proxy_session *session, *nsession;
  1313. rspamd_fstring_t *reply;
  1314. const rspamd_ftok_t *orig_ct;
  1315. goffset body_offset = -1;
  1316. session = bk_conn->s;
  1317. rspamd_http_connection_steal_msg (session->master_conn->backend_conn);
  1318. proxy_request_decompress (msg);
  1319. /*
  1320. * These are likely set by an http library, so we will double these headers
  1321. * if they are not removed
  1322. */
  1323. rspamd_http_message_remove_header (msg, "Content-Length");
  1324. rspamd_http_message_remove_header (msg, "Connection");
  1325. rspamd_http_message_remove_header (msg, "Date");
  1326. rspamd_http_message_remove_header (msg, "Server");
  1327. rspamd_http_message_remove_header (msg, "Key");
  1328. orig_ct = rspamd_http_message_find_header (msg, "Content-Type");
  1329. rspamd_http_connection_reset (session->master_conn->backend_conn);
  1330. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  1331. bk_conn->parser_from_ref, msg, &body_offset, orig_ct)) {
  1332. msg_warn_session ("cannot parse results from the master backend");
  1333. }
  1334. if (session->legacy_support > LEGACY_SUPPORT_NO) {
  1335. /* We need to reformat ucl to fit with legacy spamc protocol */
  1336. if (bk_conn->results) {
  1337. reply = rspamd_fstring_new ();
  1338. if (session->legacy_support == LEGACY_SUPPORT_SPAMC) {
  1339. rspamd_ucl_tospamc_output (bk_conn->results, &reply);
  1340. msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
  1341. }
  1342. else {
  1343. rspamd_ucl_torspamc_output (bk_conn->results, &reply);
  1344. }
  1345. rspamd_http_message_set_body_from_fstring_steal (msg, reply);
  1346. msg->method = HTTP_SYMBOLS;
  1347. }
  1348. else {
  1349. msg_warn_session ("cannot parse results from the master backend, "
  1350. "return them as is");
  1351. }
  1352. }
  1353. rspamd_upstream_ok (bk_conn->up);
  1354. if (session->client_milter_conn) {
  1355. nsession = proxy_session_refresh (session);
  1356. if (body_offset > 0) {
  1357. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1358. session->master_conn->results,
  1359. msg->body_buf.begin + body_offset,
  1360. msg->body_buf.len - body_offset);
  1361. }
  1362. else {
  1363. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1364. session->master_conn->results, NULL, 0);
  1365. }
  1366. REF_RELEASE (session);
  1367. rspamd_http_message_free (msg);
  1368. }
  1369. else {
  1370. const gchar *passed_ct = NULL;
  1371. if (orig_ct) {
  1372. passed_ct = rspamd_mempool_ftokdup (session->pool, orig_ct);
  1373. /* Remove original */
  1374. rspamd_http_message_remove_header (msg, "Content-Type");
  1375. }
  1376. rspamd_http_connection_write_message (session->client_conn,
  1377. msg, NULL, passed_ct, session,
  1378. bk_conn->timeout);
  1379. }
  1380. return 0;
  1381. }
  1382. static void
  1383. rspamd_proxy_scan_self_reply (struct rspamd_task *task)
  1384. {
  1385. struct rspamd_http_message *msg;
  1386. struct rspamd_proxy_session *session = task->fin_arg, *nsession;
  1387. ucl_object_t *rep = NULL;
  1388. const char *ctype = "application/json";
  1389. msg = rspamd_http_new_message (HTTP_RESPONSE);
  1390. msg->date = time (NULL);
  1391. msg->code = 200;
  1392. switch (task->cmd) {
  1393. case CMD_CHECK:
  1394. case CMD_SKIP:
  1395. case CMD_CHECK_RSPAMC:
  1396. case CMD_CHECK_SPAMC:
  1397. case CMD_CHECK_V2:
  1398. rspamd_task_set_finish_time (task);
  1399. rspamd_protocol_http_reply (msg, task, &rep);
  1400. rspamd_protocol_write_log_pipe (task);
  1401. break;
  1402. case CMD_PING:
  1403. rspamd_http_message_set_body (msg, "pong" CRLF, 6);
  1404. ctype = "text/plain";
  1405. break;
  1406. default:
  1407. msg_err_task ("BROKEN");
  1408. break;
  1409. }
  1410. session->master_conn->flags |= RSPAMD_BACKEND_CLOSED;
  1411. if (rep) {
  1412. session->master_conn->results = ucl_object_ref (rep);
  1413. }
  1414. if (session->client_milter_conn) {
  1415. nsession = proxy_session_refresh (session);
  1416. if (task->flags & RSPAMD_TASK_FLAG_MESSAGE_REWRITE) {
  1417. const gchar *start;
  1418. goffset len, hdr_off;
  1419. start = task->msg.begin;
  1420. len = task->msg.len;
  1421. hdr_off = MESSAGE_FIELD (task, raw_headers_content).len;
  1422. if (hdr_off < len) {
  1423. start += hdr_off;
  1424. len -= hdr_off;
  1425. /* The problem here is that we need not end of headers, we need
  1426. * start of body.
  1427. *
  1428. * Hence, we need to skip one \r\n till there is anything else in
  1429. * a line.
  1430. */
  1431. if (*start == '\r' && len > 0) {
  1432. start++;
  1433. len--;
  1434. }
  1435. if (*start == '\n' && len > 0) {
  1436. start++;
  1437. len--;
  1438. }
  1439. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1440. session->master_conn->results, start, len);
  1441. }
  1442. else {
  1443. /* XXX: should never happen! */
  1444. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1445. session->master_conn->results, NULL, 0);
  1446. }
  1447. }
  1448. else {
  1449. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1450. session->master_conn->results, NULL, 0);
  1451. }
  1452. rspamd_http_message_free (msg);
  1453. REF_RELEASE (session);
  1454. }
  1455. else {
  1456. rspamd_http_connection_reset (session->client_conn);
  1457. rspamd_http_connection_write_message (session->client_conn,
  1458. msg,
  1459. NULL,
  1460. ctype,
  1461. session,
  1462. 0);
  1463. }
  1464. }
  1465. static gboolean
  1466. rspamd_proxy_task_fin (void *ud)
  1467. {
  1468. struct rspamd_task *task = ud;
  1469. msg_debug_task ("finish task");
  1470. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  1471. rspamd_proxy_scan_self_reply (task);
  1472. return TRUE;
  1473. }
  1474. if (!rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL)) {
  1475. rspamd_proxy_scan_self_reply (task);
  1476. return TRUE;
  1477. }
  1478. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  1479. rspamd_proxy_scan_self_reply (task);
  1480. return TRUE;
  1481. }
  1482. /* One more iteration */
  1483. return FALSE;
  1484. }
  1485. static gboolean
  1486. rspamd_proxy_self_scan (struct rspamd_proxy_session *session)
  1487. {
  1488. struct rspamd_task *task;
  1489. struct rspamd_http_message *msg;
  1490. const gchar *data;
  1491. gsize len;
  1492. msg = session->client_message;
  1493. task = rspamd_task_new (session->worker, session->ctx->cfg,
  1494. session->pool, session->ctx->lang_det,
  1495. session->ctx->event_loop, FALSE);
  1496. task->flags |= RSPAMD_TASK_FLAG_MIME;
  1497. if (session->ctx->milter) {
  1498. task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_MILTER|
  1499. RSPAMD_TASK_PROTOCOL_FLAG_BODY_BLOCK;
  1500. }
  1501. task->sock = -1;
  1502. if (session->client_milter_conn) {
  1503. task->client_addr = rspamd_inet_address_copy (
  1504. session->client_milter_conn->addr);
  1505. }
  1506. else {
  1507. task->client_addr = rspamd_inet_address_copy (session->client_addr);
  1508. }
  1509. task->fin_arg = session;
  1510. task->resolver = session->ctx->resolver;
  1511. /* TODO: allow to disable autolearn in protocol */
  1512. task->flags |= RSPAMD_TASK_FLAG_LEARN_AUTO;
  1513. task->s = rspamd_session_create (task->task_pool, rspamd_proxy_task_fin,
  1514. NULL, (event_finalizer_t )rspamd_task_free, task);
  1515. data = rspamd_http_message_get_body (msg, &len);
  1516. if (session->backend->settings_id) {
  1517. rspamd_http_message_remove_header (msg, "Settings-ID");
  1518. rspamd_http_message_add_header (msg, "Settings-ID",
  1519. session->backend->settings_id);
  1520. }
  1521. /* Process message */
  1522. if (!rspamd_protocol_handle_request (task, msg)) {
  1523. msg_err_task ("cannot handle request: %e", task->err);
  1524. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1525. }
  1526. else {
  1527. if (task->cmd == CMD_PING) {
  1528. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1529. }
  1530. else {
  1531. if (!rspamd_task_load_message (task, msg, data, len)) {
  1532. msg_err_task ("cannot load message: %e", task->err);
  1533. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1534. }
  1535. }
  1536. }
  1537. /* Set global timeout for the task */
  1538. if (session->ctx->default_upstream->timeout > 0.0) {
  1539. task->timeout_ev.data = task;
  1540. ev_timer_init (&task->timeout_ev, rspamd_task_timeout,
  1541. session->ctx->default_upstream->timeout,
  1542. session->ctx->default_upstream->timeout);
  1543. ev_timer_start (task->event_loop, &task->timeout_ev);
  1544. }
  1545. else if (session->ctx->has_self_scan) {
  1546. if (session->ctx->cfg->task_timeout > 0) {
  1547. task->timeout_ev.data = task;
  1548. ev_timer_init (&task->timeout_ev, rspamd_task_timeout,
  1549. session->ctx->cfg->task_timeout,
  1550. session->ctx->default_upstream->timeout);
  1551. ev_timer_start (task->event_loop, &task->timeout_ev);
  1552. }
  1553. }
  1554. session->master_conn->task = task;
  1555. rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL);
  1556. rspamd_session_pending (task->s);
  1557. return TRUE;
  1558. }
  1559. static gboolean
  1560. proxy_send_master_message (struct rspamd_proxy_session *session)
  1561. {
  1562. struct rspamd_http_message *msg;
  1563. struct rspamd_http_upstream *backend = NULL;
  1564. const rspamd_ftok_t *host;
  1565. GError *err = NULL;
  1566. gchar hostbuf[512];
  1567. host = rspamd_http_message_find_header (session->client_message, "Host");
  1568. if (host == NULL) {
  1569. backend = session->ctx->default_upstream;
  1570. }
  1571. else {
  1572. rspamd_strlcpy (hostbuf, host->begin, MIN(host->len + 1, sizeof (hostbuf)));
  1573. backend = g_hash_table_lookup (session->ctx->upstreams, hostbuf);
  1574. if (backend == NULL) {
  1575. backend = session->ctx->default_upstream;
  1576. }
  1577. }
  1578. if (backend == NULL) {
  1579. /* No backend */
  1580. msg_err_session ("cannot find upstream for %s", host ? hostbuf : "default");
  1581. goto err;
  1582. }
  1583. else {
  1584. session->backend = backend;
  1585. if (backend->self_scan) {
  1586. return rspamd_proxy_self_scan (session);
  1587. }
  1588. retry:
  1589. if (session->ctx->max_retries &&
  1590. session->retries > session->ctx->max_retries) {
  1591. msg_err_session ("cannot connect to upstream, maximum retries "
  1592. "has been reached: %d", session->retries);
  1593. goto err;
  1594. }
  1595. /* Provide hash key if hashing based on source address is desired */
  1596. guint hash_len;
  1597. gpointer hash_key = rspamd_inet_address_get_hash_key (session->client_addr,
  1598. &hash_len);
  1599. if (session->ctx->max_retries > 1 &&
  1600. session->retries == session->ctx->max_retries) {
  1601. session->master_conn->up = rspamd_upstream_get_except (backend->u,
  1602. session->master_conn->up,
  1603. RSPAMD_UPSTREAM_ROUND_ROBIN,
  1604. hash_key, hash_len);
  1605. }
  1606. else {
  1607. session->master_conn->up = rspamd_upstream_get (backend->u,
  1608. RSPAMD_UPSTREAM_ROUND_ROBIN,
  1609. hash_key, hash_len);
  1610. }
  1611. session->master_conn->timeout = backend->timeout;
  1612. if (session->master_conn->up == NULL) {
  1613. msg_err_session ("cannot select upstream for %s",
  1614. host ? hostbuf : "default");
  1615. goto err;
  1616. }
  1617. session->master_conn->backend_sock = rspamd_inet_address_connect (
  1618. rspamd_upstream_addr_next (session->master_conn->up),
  1619. SOCK_STREAM, TRUE);
  1620. if (session->master_conn->backend_sock == -1) {
  1621. msg_err_session ("cannot connect upstream: %s(%s)",
  1622. host ? hostbuf : "default",
  1623. rspamd_inet_address_to_string_pretty (
  1624. rspamd_upstream_addr_cur (
  1625. session->master_conn->up)));
  1626. rspamd_upstream_fail (session->master_conn->up, TRUE,
  1627. strerror (errno));
  1628. session->retries ++;
  1629. goto retry;
  1630. }
  1631. msg = rspamd_http_connection_copy_msg (session->client_message, &err);
  1632. if (msg == NULL) {
  1633. msg_err_session ("cannot copy message to send it to the upstream: %e",
  1634. err);
  1635. if (err) {
  1636. g_error_free (err);
  1637. }
  1638. goto err; /* No fallback here */
  1639. }
  1640. session->master_conn->backend_conn = rspamd_http_connection_new_client_socket (
  1641. session->ctx->http_ctx,
  1642. NULL,
  1643. proxy_backend_master_error_handler,
  1644. proxy_backend_master_finish_handler,
  1645. RSPAMD_HTTP_CLIENT_SIMPLE,
  1646. session->master_conn->backend_sock);
  1647. session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED;
  1648. session->master_conn->parser_from_ref = backend->parser_from_ref;
  1649. session->master_conn->parser_to_ref = backend->parser_to_ref;
  1650. if (backend->key) {
  1651. msg->peer_key = rspamd_pubkey_ref (backend->key);
  1652. }
  1653. if (backend->settings_id != NULL) {
  1654. rspamd_http_message_remove_header (msg, "Settings-ID");
  1655. rspamd_http_message_add_header (msg, "Settings-ID",
  1656. backend->settings_id);
  1657. }
  1658. if (backend->local ||
  1659. rspamd_inet_address_is_local (
  1660. rspamd_upstream_addr_cur (
  1661. session->master_conn->up))) {
  1662. if (session->fname) {
  1663. rspamd_http_message_add_header (msg, "File", session->fname);
  1664. }
  1665. msg->method = HTTP_GET;
  1666. rspamd_http_connection_write_message_shared (
  1667. session->master_conn->backend_conn,
  1668. msg, NULL, NULL, session->master_conn,
  1669. session->master_conn->timeout);
  1670. }
  1671. else {
  1672. if (session->fname) {
  1673. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1674. rspamd_http_message_set_body (msg,
  1675. session->map, session->map_len);
  1676. }
  1677. msg->method = HTTP_POST;
  1678. if (backend->compress) {
  1679. proxy_request_compress (msg);
  1680. if (session->client_milter_conn) {
  1681. rspamd_http_message_add_header (msg, "Content-Type",
  1682. "application/octet-stream");
  1683. }
  1684. }
  1685. else {
  1686. if (session->client_milter_conn) {
  1687. rspamd_http_message_add_header (msg, "Content-Type",
  1688. "text/plain");
  1689. }
  1690. }
  1691. rspamd_http_connection_write_message (
  1692. session->master_conn->backend_conn,
  1693. msg, NULL, NULL, session->master_conn,
  1694. session->master_conn->timeout);
  1695. }
  1696. }
  1697. return TRUE;
  1698. err:
  1699. if (session->client_milter_conn) {
  1700. rspamd_milter_send_action (session->client_milter_conn,
  1701. RSPAMD_MILTER_TEMPFAIL);
  1702. REF_RELEASE (session);
  1703. }
  1704. else {
  1705. rspamd_http_connection_steal_msg (session->client_conn);
  1706. rspamd_http_connection_reset (session->client_conn);
  1707. proxy_client_write_error (session, 404, "Backend not found");
  1708. }
  1709. return FALSE;
  1710. }
  1711. static void
  1712. proxy_client_error_handler (struct rspamd_http_connection *conn, GError *err)
  1713. {
  1714. struct rspamd_proxy_session *session = conn->ud;
  1715. msg_info_session ("abnormally closing connection from: %s, error: %s",
  1716. rspamd_inet_address_to_string (session->client_addr), err->message);
  1717. /* Terminate session immediately */
  1718. proxy_backend_close_connection (session->master_conn);
  1719. REF_RELEASE (session);
  1720. }
  1721. static gint
  1722. proxy_client_finish_handler (struct rspamd_http_connection *conn,
  1723. struct rspamd_http_message *msg)
  1724. {
  1725. struct rspamd_proxy_session *session = conn->ud;
  1726. if (!session->master_conn) {
  1727. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1728. sizeof (*session->master_conn));
  1729. session->master_conn->s = session;
  1730. session->master_conn->name = "master";
  1731. /* Reset spamc legacy */
  1732. if (msg->method >= HTTP_SYMBOLS) {
  1733. msg->method = HTTP_POST;
  1734. if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) {
  1735. session->legacy_support = LEGACY_SUPPORT_SPAMC;
  1736. msg_info_session ("enabling legacy spamc mode for session");
  1737. }
  1738. else {
  1739. session->legacy_support = LEGACY_SUPPORT_RSPAMC;
  1740. msg_info_session ("enabling legacy rspamc mode for session");
  1741. }
  1742. }
  1743. if (msg->url->len == 0) {
  1744. msg->url = rspamd_fstring_append (msg->url,
  1745. "/" MSG_CMD_CHECK_V2, strlen ("/" MSG_CMD_CHECK_V2));
  1746. }
  1747. if (!proxy_check_file (msg, session)) {
  1748. goto err;
  1749. }
  1750. session->client_message = rspamd_http_connection_steal_msg (
  1751. session->client_conn);
  1752. session->shmem_ref = rspamd_http_message_shmem_ref (session->client_message);
  1753. rspamd_http_message_remove_header (msg, "Content-Length");
  1754. rspamd_http_message_remove_header (msg, "Transfer-Encoding");
  1755. rspamd_http_message_remove_header (msg, "Keep-Alive");
  1756. rspamd_http_message_remove_header (msg, "Connection");
  1757. rspamd_http_message_remove_header (msg, "Key");
  1758. proxy_open_mirror_connections (session);
  1759. rspamd_http_connection_reset (session->client_conn);
  1760. proxy_send_master_message (session);
  1761. }
  1762. else {
  1763. msg_info_session ("finished master connection");
  1764. proxy_backend_close_connection (session->master_conn);
  1765. REF_RELEASE (session);
  1766. }
  1767. return 0;
  1768. err:
  1769. rspamd_http_connection_steal_msg (session->client_conn);
  1770. rspamd_http_message_remove_header (msg, "Content-Length");
  1771. rspamd_http_message_remove_header (msg, "Key");
  1772. rspamd_http_message_remove_header (msg, "Transfer-Encoding");
  1773. rspamd_http_message_remove_header (msg, "Keep-Alive");
  1774. rspamd_http_message_remove_header (msg, "Connection");
  1775. rspamd_http_connection_reset (session->client_conn);
  1776. proxy_client_write_error (session, 404, "Backend not found");
  1777. return 0;
  1778. }
  1779. static void
  1780. proxy_milter_finish_handler (gint fd,
  1781. struct rspamd_milter_session *rms,
  1782. void *ud)
  1783. {
  1784. struct rspamd_proxy_session *session = ud;
  1785. struct rspamd_http_message *msg;
  1786. session->client_milter_conn = rms;
  1787. if (rms->message == NULL || rms->message->len == 0) {
  1788. msg_info_session ("finished milter connection");
  1789. proxy_backend_close_connection (session->master_conn);
  1790. REF_RELEASE (session);
  1791. }
  1792. else {
  1793. if (!session->master_conn) {
  1794. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1795. sizeof (*session->master_conn));
  1796. }
  1797. msg = rspamd_milter_to_http (rms);
  1798. session->master_conn->s = session;
  1799. session->master_conn->name = "master";
  1800. session->client_message = msg;
  1801. proxy_open_mirror_connections (session);
  1802. proxy_send_master_message (session);
  1803. }
  1804. }
  1805. static void
  1806. proxy_milter_error_handler (gint fd,
  1807. struct rspamd_milter_session *rms, /* unused */
  1808. void *ud, GError *err)
  1809. {
  1810. struct rspamd_proxy_session *session = ud;
  1811. if (err && err->code != 0) {
  1812. msg_info_session ("abnormally closing milter connection from: %s, "
  1813. "error: %e",
  1814. rspamd_inet_address_to_string_pretty (session->client_addr),
  1815. err);
  1816. /* Terminate session immediately */
  1817. proxy_backend_close_connection (session->master_conn);
  1818. REF_RELEASE (session);
  1819. }
  1820. else {
  1821. msg_info_session ("normally closing milter connection from: %s, "
  1822. "%e",
  1823. rspamd_inet_address_to_string_pretty (session->client_addr),
  1824. err);
  1825. /* Terminate session immediately */
  1826. proxy_backend_close_connection (session->master_conn);
  1827. REF_RELEASE (session);
  1828. }
  1829. }
  1830. static void
  1831. proxy_accept_socket (EV_P_ ev_io *w, int revents)
  1832. {
  1833. struct rspamd_worker *worker = (struct rspamd_worker *)w->data;
  1834. struct rspamd_proxy_ctx *ctx;
  1835. rspamd_inet_addr_t *addr;
  1836. struct rspamd_proxy_session *session;
  1837. gint nfd;
  1838. ctx = worker->ctx;
  1839. if ((nfd =
  1840. rspamd_accept_from_socket (w->fd, &addr,
  1841. rspamd_worker_throttle_accept_events, worker->accept_events)) == -1) {
  1842. msg_warn ("accept failed: %s", strerror (errno));
  1843. return;
  1844. }
  1845. /* Check for EAGAIN */
  1846. if (nfd == 0) {
  1847. return;
  1848. }
  1849. session = g_malloc0 (sizeof (*session));
  1850. REF_INIT_RETAIN (session, proxy_session_dtor);
  1851. session->client_sock = nfd;
  1852. session->client_addr = addr;
  1853. session->mirror_conns = g_ptr_array_sized_new (ctx->mirrors->len);
  1854. session->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (),
  1855. "proxy", 0);
  1856. session->ctx = ctx;
  1857. session->worker = worker;
  1858. if (ctx->sessions_cache) {
  1859. rspamd_worker_session_cache_add (ctx->sessions_cache,
  1860. session->pool->tag.uid, &session->ref.refcount, session);
  1861. }
  1862. if (!ctx->milter) {
  1863. session->client_conn = rspamd_http_connection_new_server (
  1864. ctx->http_ctx,
  1865. nfd,
  1866. NULL,
  1867. proxy_client_error_handler,
  1868. proxy_client_finish_handler,
  1869. 0);
  1870. if (ctx->key) {
  1871. rspamd_http_connection_set_key (session->client_conn, ctx->key);
  1872. }
  1873. msg_info_session ("accepted http connection from %s port %d",
  1874. rspamd_inet_address_to_string (addr),
  1875. rspamd_inet_address_get_port (addr));
  1876. rspamd_http_connection_read_message_shared (session->client_conn,
  1877. session,
  1878. session->ctx->timeout);
  1879. }
  1880. else {
  1881. msg_info_session ("accepted milter connection from %s port %d",
  1882. rspamd_inet_address_to_string (addr),
  1883. rspamd_inet_address_get_port (addr));
  1884. #ifdef TCP_NODELAY
  1885. #ifndef SOL_TCP
  1886. #define SOL_TCP IPPROTO_TCP
  1887. #endif
  1888. if (rspamd_inet_address_get_af (addr) != AF_UNIX) {
  1889. gint sopt = 1;
  1890. if (setsockopt (nfd, SOL_TCP, TCP_NODELAY, &sopt, sizeof (sopt)) ==
  1891. -1) {
  1892. msg_warn_session ("cannot set TCP_NODELAY: %s",
  1893. strerror (errno));
  1894. }
  1895. }
  1896. #endif
  1897. rspamd_milter_handle_socket (nfd, 0.0,
  1898. session->pool,
  1899. ctx->event_loop,
  1900. proxy_milter_finish_handler,
  1901. proxy_milter_error_handler,
  1902. session);
  1903. }
  1904. }
  1905. static void
  1906. adjust_upstreams_limits (struct rspamd_proxy_ctx *ctx)
  1907. {
  1908. struct rspamd_http_upstream *backend;
  1909. gpointer k, v;
  1910. GHashTableIter it;
  1911. /*
  1912. * We set error time equal to max_retries * backend_timeout and max_errors
  1913. * to max_retries - 1
  1914. *
  1915. * So if we failed to scan a message on a backend for some reasons, we
  1916. * will try to re-resolve it faster
  1917. */
  1918. g_hash_table_iter_init (&it, ctx->upstreams);
  1919. while (g_hash_table_iter_next (&it, &k, &v)) {
  1920. backend = (struct rspamd_http_upstream *)v;
  1921. if (!backend->self_scan && backend->u) {
  1922. rspamd_upstreams_set_limits (backend->u,
  1923. NAN, NAN, ctx->max_retries * backend->timeout, NAN,
  1924. ctx->max_retries - 1, 0);
  1925. }
  1926. }
  1927. }
  1928. __attribute__((noreturn))
  1929. void
  1930. start_rspamd_proxy (struct rspamd_worker *worker)
  1931. {
  1932. struct rspamd_proxy_ctx *ctx = worker->ctx;
  1933. gboolean is_controller = FALSE;
  1934. g_assert (rspamd_worker_check_context (worker->ctx, rspamd_rspamd_proxy_magic));
  1935. ctx->cfg = worker->srv->cfg;
  1936. ctx->event_loop = rspamd_prepare_worker (worker, "rspamd_proxy",
  1937. proxy_accept_socket);
  1938. ctx->resolver = rspamd_dns_resolver_init (worker->srv->logger,
  1939. ctx->event_loop,
  1940. worker->srv->cfg);
  1941. rspamd_upstreams_library_config (worker->srv->cfg, ctx->cfg->ups_ctx,
  1942. ctx->event_loop, ctx->resolver->r);
  1943. ctx->http_ctx = rspamd_http_context_create (ctx->cfg, ctx->event_loop,
  1944. ctx->cfg->ups_ctx);
  1945. rspamd_mempool_add_destructor (ctx->cfg->cfg_pool,
  1946. (rspamd_mempool_destruct_t)rspamd_http_context_free,
  1947. ctx->http_ctx);
  1948. if (ctx->has_self_scan) {
  1949. /* Additional initialisation needed */
  1950. rspamd_worker_init_scanner (worker, ctx->event_loop, ctx->resolver,
  1951. &ctx->lang_det);
  1952. if (worker->index == 0) {
  1953. /*
  1954. * If there are no controllers and no normal workers,
  1955. * then pretend that we are a controller
  1956. */
  1957. gboolean controller_seen = FALSE;
  1958. GList *cur;
  1959. cur = worker->srv->cfg->workers;
  1960. while (cur) {
  1961. struct rspamd_worker_conf *cf;
  1962. cf = (struct rspamd_worker_conf *)cur->data;
  1963. if ((cf->type == g_quark_from_static_string ("controller")) ||
  1964. (cf->type == g_quark_from_static_string ("normal"))) {
  1965. if (cf->enabled && cf->count >= 0) {
  1966. controller_seen = TRUE;
  1967. break;
  1968. }
  1969. }
  1970. cur = g_list_next (cur);
  1971. }
  1972. if (!controller_seen) {
  1973. msg_info ("no controller or normal workers defined, execute "
  1974. "controller periodics in this worker");
  1975. worker->flags |= RSPAMD_WORKER_CONTROLLER;
  1976. is_controller = TRUE;
  1977. }
  1978. }
  1979. }
  1980. else {
  1981. worker->flags &= ~RSPAMD_WORKER_SCANNER;
  1982. }
  1983. if (worker->srv->cfg->enable_sessions_cache) {
  1984. ctx->sessions_cache = rspamd_worker_session_cache_new (worker,
  1985. ctx->event_loop);
  1986. }
  1987. ctx->milter_ctx.spam_header = ctx->spam_header;
  1988. ctx->milter_ctx.discard_on_reject = ctx->discard_on_reject;
  1989. ctx->milter_ctx.quarantine_on_reject = ctx->quarantine_on_reject;
  1990. ctx->milter_ctx.sessions_cache = ctx->sessions_cache;
  1991. ctx->milter_ctx.client_ca_name = ctx->client_ca_name;
  1992. ctx->milter_ctx.reject_message = ctx->reject_message;
  1993. ctx->milter_ctx.cfg = ctx->cfg;
  1994. rspamd_milter_init_library (&ctx->milter_ctx);
  1995. if (is_controller) {
  1996. rspamd_worker_init_controller (worker, NULL);
  1997. }
  1998. else {
  1999. if (ctx->has_self_scan) {
  2000. rspamd_map_watch (worker->srv->cfg, ctx->event_loop, ctx->resolver,
  2001. worker, RSPAMD_MAP_WATCH_SCANNER);
  2002. }
  2003. else {
  2004. rspamd_map_watch (worker->srv->cfg, ctx->event_loop, ctx->resolver,
  2005. worker, RSPAMD_MAP_WATCH_WORKER);
  2006. }
  2007. }
  2008. rspamd_lua_run_postloads (ctx->cfg->lua_state, ctx->cfg, ctx->event_loop,
  2009. worker);
  2010. adjust_upstreams_limits (ctx);
  2011. ev_loop (ctx->event_loop, 0);
  2012. rspamd_worker_block_signals ();
  2013. if (ctx->has_self_scan) {
  2014. rspamd_stat_close ();
  2015. }
  2016. if (is_controller) {
  2017. rspamd_controller_on_terminate (worker, NULL);
  2018. }
  2019. REF_RELEASE (ctx->cfg);
  2020. rspamd_log_close (worker->srv->logger);
  2021. exit (EXIT_SUCCESS);
  2022. }