You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd_proxy.c 61KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "libutil/util.h"
  18. #include "libserver/maps/map.h"
  19. #include "libutil/upstream.h"
  20. #include "libserver/http/http_connection.h"
  21. #include "libserver/http/http_private.h"
  22. #include "libserver/protocol.h"
  23. #include "libserver/protocol_internal.h"
  24. #include "libserver/cfg_file.h"
  25. #include "libserver/url.h"
  26. #include "libserver/dns.h"
  27. #include "libmime/message.h"
  28. #include "rspamd.h"
  29. #include "libserver/worker_util.h"
  30. #include "worker_private.h"
  31. #include "lua/lua_common.h"
  32. #include "keypairs_cache.h"
  33. #include "libstat/stat_api.h"
  34. #include "ottery.h"
  35. #include "unix-std.h"
  36. #include "libserver/milter.h"
  37. #include "libserver/milter_internal.h"
  38. #include "libmime/lang_detection.h"
  39. #include <math.h>
  40. #ifdef HAVE_NETINET_TCP_H
  41. #include <netinet/tcp.h> /* for TCP_NODELAY */
  42. #endif
  43. #ifdef SYS_ZSTD
  44. # include "zstd.h"
  45. #else
  46. # include "contrib/zstd/zstd.h"
  47. #endif
  48. /* Rotate keys each minute by default */
  49. #define DEFAULT_ROTATION_TIME 60.0
  50. #define DEFAULT_RETRIES 5
  51. #define msg_err_session(...) rspamd_default_log_function (G_LOG_LEVEL_CRITICAL, \
  52. session->pool->tag.tagname, session->pool->tag.uid, \
  53. G_STRFUNC, \
  54. __VA_ARGS__)
  55. #define msg_warn_session(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  56. session->pool->tag.tagname, session->pool->tag.uid, \
  57. G_STRFUNC, \
  58. __VA_ARGS__)
  59. #define msg_info_session(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  60. session->pool->tag.tagname, session->pool->tag.uid, \
  61. G_STRFUNC, \
  62. __VA_ARGS__)
  63. #define msg_debug_session(...) rspamd_conditional_debug_fast (NULL, session->client_addr, \
  64. rspamd_proxy_log_id, "proxy", session->pool->tag.uid, \
  65. G_STRFUNC, \
  66. __VA_ARGS__)
  67. INIT_LOG_MODULE(proxy)
  68. gpointer init_rspamd_proxy (struct rspamd_config *cfg);
  69. void start_rspamd_proxy (struct rspamd_worker *worker);
  70. worker_t rspamd_proxy_worker = {
  71. "rspamd_proxy", /* Name */
  72. init_rspamd_proxy, /* Init function */
  73. start_rspamd_proxy, /* Start function */
  74. RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE | RSPAMD_WORKER_SCANNER,
  75. RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */
  76. RSPAMD_WORKER_VER
  77. };
  78. struct rspamd_http_upstream {
  79. gchar *name;
  80. gchar *settings_id;
  81. struct upstream_list *u;
  82. struct rspamd_cryptobox_pubkey *key;
  83. gdouble timeout;
  84. gint parser_from_ref;
  85. gint parser_to_ref;
  86. gboolean local;
  87. gboolean self_scan;
  88. gboolean compress;
  89. };
  90. struct rspamd_http_mirror {
  91. gchar *name;
  92. gchar *settings_id;
  93. struct upstream_list *u;
  94. struct rspamd_cryptobox_pubkey *key;
  95. gdouble prob;
  96. gdouble timeout;
  97. gint parser_from_ref;
  98. gint parser_to_ref;
  99. gboolean local;
  100. gboolean compress;
  101. };
  102. static const guint64 rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL;
  103. struct rspamd_proxy_ctx {
  104. guint64 magic;
  105. /* Events base */
  106. struct ev_loop *event_loop;
  107. /* DNS resolver */
  108. struct rspamd_dns_resolver *resolver;
  109. /* Config */
  110. struct rspamd_config *cfg;
  111. /* END OF COMMON PART */
  112. gdouble timeout;
  113. /* Encryption key for clients */
  114. struct rspamd_cryptobox_keypair *key;
  115. /* HTTP context */
  116. struct rspamd_http_context *http_ctx;
  117. /* Upstreams to use */
  118. GHashTable *upstreams;
  119. /* Mirrors to send traffic to */
  120. GPtrArray *mirrors;
  121. /* Default upstream */
  122. struct rspamd_http_upstream *default_upstream;
  123. lua_State *lua_state;
  124. /* Array of callback functions called on end of scan to compare results */
  125. GArray *cmp_refs;
  126. /* Maximum count for retries */
  127. guint max_retries;
  128. /* If we have self_scanning backends, we need to work as a normal worker */
  129. gboolean has_self_scan;
  130. /* It is not HTTP but milter proxy */
  131. gboolean milter;
  132. /* Discard messages instead of rejecting them */
  133. gboolean discard_on_reject;
  134. /* Quarantine messages instead of rejecting them */
  135. gboolean quarantine_on_reject;
  136. /* Milter spam header */
  137. gchar *spam_header;
  138. /* CA name that can be used for client certificates */
  139. gchar *client_ca_name;
  140. /* Milter rejection message */
  141. gchar *reject_message;
  142. /* Sessions cache */
  143. void *sessions_cache;
  144. struct rspamd_milter_context milter_ctx;
  145. /* Language detector */
  146. struct rspamd_lang_detector *lang_det;
  147. };
  148. enum rspamd_backend_flags {
  149. RSPAMD_BACKEND_REPLIED = 1 << 0,
  150. RSPAMD_BACKEND_CLOSED = 1 << 1,
  151. RSPAMD_BACKEND_PARSED = 1 << 2,
  152. };
  153. struct rspamd_proxy_session;
  154. struct rspamd_proxy_backend_connection {
  155. const gchar *name;
  156. struct rspamd_cryptobox_keypair *local_key;
  157. struct rspamd_cryptobox_pubkey *remote_key;
  158. struct upstream *up;
  159. struct rspamd_http_connection *backend_conn;
  160. ucl_object_t *results;
  161. const gchar *err;
  162. struct rspamd_proxy_session *s;
  163. gint backend_sock;
  164. ev_tstamp timeout;
  165. enum rspamd_backend_flags flags;
  166. gint parser_from_ref;
  167. gint parser_to_ref;
  168. struct rspamd_task *task;
  169. };
  170. enum rspamd_proxy_legacy_support {
  171. LEGACY_SUPPORT_NO = 0,
  172. LEGACY_SUPPORT_RSPAMC,
  173. LEGACY_SUPPORT_SPAMC
  174. };
  175. struct rspamd_proxy_session {
  176. struct rspamd_worker *worker;
  177. rspamd_mempool_t *pool;
  178. struct rspamd_proxy_ctx *ctx;
  179. rspamd_inet_addr_t *client_addr;
  180. struct rspamd_http_connection *client_conn;
  181. struct rspamd_milter_session *client_milter_conn;
  182. struct rspamd_http_upstream *backend;
  183. gpointer map;
  184. gchar *fname;
  185. gpointer shmem_ref;
  186. struct rspamd_proxy_backend_connection *master_conn;
  187. struct rspamd_http_message *client_message;
  188. GPtrArray *mirror_conns;
  189. gsize map_len;
  190. gint client_sock;
  191. enum rspamd_proxy_legacy_support legacy_support;
  192. gint retries;
  193. ref_entry_t ref;
  194. };
  195. static gboolean proxy_send_master_message (struct rspamd_proxy_session *session);
  196. static GQuark
  197. rspamd_proxy_quark (void)
  198. {
  199. return g_quark_from_static_string ("rspamd-proxy");
  200. }
  201. static gboolean
  202. rspamd_proxy_parse_lua_parser (lua_State *L, const ucl_object_t *obj,
  203. gint *ref_from, gint *ref_to, GError **err)
  204. {
  205. const gchar *lua_script;
  206. gsize slen;
  207. gint err_idx, ref_idx;
  208. gboolean has_ref = FALSE;
  209. g_assert (obj != NULL);
  210. g_assert (ref_from != NULL);
  211. g_assert (ref_to != NULL);
  212. *ref_from = -1;
  213. *ref_to = -1;
  214. lua_script = ucl_object_tolstring (obj, &slen);
  215. lua_pushcfunction (L, &rspamd_lua_traceback);
  216. err_idx = lua_gettop (L);
  217. /* Load data */
  218. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  219. g_set_error (err,
  220. rspamd_proxy_quark (),
  221. EINVAL,
  222. "cannot load lua parser script: %s",
  223. lua_tostring (L, -1));
  224. lua_settop (L, 0); /* Error function */
  225. return FALSE;
  226. }
  227. /* Now do it */
  228. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  229. g_set_error (err,
  230. rspamd_proxy_quark (),
  231. EINVAL,
  232. "cannot init lua parser script: %s",
  233. lua_tostring (L, -1));
  234. lua_settop (L, 0);
  235. return FALSE;
  236. }
  237. if (lua_istable (L, -1)) {
  238. /*
  239. * We have a table, so we check for two keys:
  240. * 'from' -> function
  241. * 'to' -> function
  242. *
  243. * From converts parent request to a client one
  244. * To converts client request to a parent one
  245. */
  246. lua_pushstring (L, "from");
  247. lua_gettable (L, -2);
  248. if (lua_isfunction (L, -1)) {
  249. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  250. *ref_from = ref_idx;
  251. has_ref = TRUE;
  252. }
  253. lua_pushstring (L, "to");
  254. lua_gettable (L, -2);
  255. if (lua_isfunction (L, -1)) {
  256. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  257. *ref_to = ref_idx;
  258. has_ref = TRUE;
  259. }
  260. }
  261. else if (!lua_isfunction (L, -1)) {
  262. g_set_error (err,
  263. rspamd_proxy_quark (),
  264. EINVAL,
  265. "cannot init lua parser script: "
  266. "must return function");
  267. lua_settop (L, 0);
  268. return FALSE;
  269. }
  270. else {
  271. /* Just parser from protocol */
  272. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  273. *ref_from = ref_idx;
  274. lua_settop (L, 0);
  275. has_ref = TRUE;
  276. }
  277. return has_ref;
  278. }
  279. static gboolean
  280. rspamd_proxy_parse_upstream (rspamd_mempool_t *pool,
  281. const ucl_object_t *obj,
  282. gpointer ud,
  283. struct rspamd_rcl_section *section,
  284. GError **err)
  285. {
  286. const ucl_object_t *elt;
  287. struct rspamd_http_upstream *up = NULL;
  288. struct rspamd_proxy_ctx *ctx;
  289. struct rspamd_rcl_struct_parser *pd = ud;
  290. lua_State *L;
  291. ctx = pd->user_struct;
  292. L = ctx->lua_state;
  293. if (ucl_object_type (obj) != UCL_OBJECT) {
  294. g_set_error (err, rspamd_proxy_quark (), 100,
  295. "upstream option must be an object");
  296. return FALSE;
  297. }
  298. up = rspamd_mempool_alloc0 (pool, sizeof (*up));
  299. elt = ucl_object_lookup (obj, "name");
  300. if (elt == NULL) {
  301. if (ucl_object_key (obj)) {
  302. if (strcmp (ucl_object_key (obj), "upstream") == 0) {
  303. /* Iterate over the object and find upstream elements */
  304. ucl_object_iter_t it = NULL;
  305. const ucl_object_t *cur;
  306. gboolean ret = TRUE;
  307. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  308. if (!rspamd_proxy_parse_upstream (pool, cur, ud,
  309. section, err)) {
  310. ret = FALSE;
  311. }
  312. }
  313. return ret;
  314. }
  315. else {
  316. /* Inside upstream */
  317. up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
  318. }
  319. }
  320. else {
  321. g_set_error (err, rspamd_proxy_quark (), 100,
  322. "upstream option must have some name definition");
  323. return FALSE;
  324. }
  325. }
  326. else {
  327. up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  328. }
  329. up->parser_from_ref = -1;
  330. up->parser_to_ref = -1;
  331. up->timeout = ctx->timeout;
  332. elt = ucl_object_lookup (obj, "key");
  333. if (elt != NULL) {
  334. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  335. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  336. if (up->key == NULL) {
  337. g_set_error (err, rspamd_proxy_quark (), 100,
  338. "cannot read upstream key");
  339. goto err;
  340. }
  341. rspamd_mempool_add_destructor (pool,
  342. (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
  343. }
  344. elt = ucl_object_lookup (obj, "self_scan");
  345. if (elt && ucl_object_toboolean (elt)) {
  346. up->self_scan = TRUE;
  347. ctx->has_self_scan = TRUE;
  348. }
  349. elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
  350. if (elt && ucl_object_toboolean (elt)) {
  351. up->compress = TRUE;
  352. }
  353. elt = ucl_object_lookup (obj, "hosts");
  354. if (elt == NULL && !up->self_scan) {
  355. g_set_error (err, rspamd_proxy_quark (), 100,
  356. "upstream option must have some hosts definition");
  357. goto err;
  358. }
  359. if (elt) {
  360. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  361. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  362. g_set_error (err, rspamd_proxy_quark (), 100,
  363. "upstream has bad hosts definition");
  364. goto err;
  365. }
  366. rspamd_mempool_add_destructor (pool,
  367. (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
  368. }
  369. elt = ucl_object_lookup (obj, "default");
  370. if (elt) {
  371. if (ucl_object_toboolean (elt)) {
  372. ctx->default_upstream = up;
  373. }
  374. }
  375. else if (up->self_scan) {
  376. ctx->default_upstream = up;
  377. }
  378. elt = ucl_object_lookup (obj, "local");
  379. if (elt && ucl_object_toboolean (elt)) {
  380. up->local = TRUE;
  381. }
  382. elt = ucl_object_lookup (obj, "timeout");
  383. if (elt) {
  384. ucl_object_todouble_safe (elt, &up->timeout);
  385. }
  386. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  387. if (elt && ucl_object_type (elt) == UCL_STRING) {
  388. up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  389. }
  390. /*
  391. * Accept lua function here in form
  392. * fun :: String -> UCL
  393. */
  394. elt = ucl_object_lookup (obj, "parser");
  395. if (elt) {
  396. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  397. &up->parser_to_ref, err)) {
  398. goto err;
  399. }
  400. rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
  401. rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
  402. }
  403. g_hash_table_insert (ctx->upstreams, up->name, up);
  404. return TRUE;
  405. err:
  406. return FALSE;
  407. }
  408. static gboolean
  409. rspamd_proxy_parse_mirror (rspamd_mempool_t *pool,
  410. const ucl_object_t *obj,
  411. gpointer ud,
  412. struct rspamd_rcl_section *section,
  413. GError **err)
  414. {
  415. const ucl_object_t *elt;
  416. struct rspamd_http_mirror *up = NULL;
  417. struct rspamd_proxy_ctx *ctx;
  418. struct rspamd_rcl_struct_parser *pd = ud;
  419. lua_State *L;
  420. ctx = pd->user_struct;
  421. L = ctx->lua_state;
  422. if (ucl_object_type (obj) != UCL_OBJECT) {
  423. g_set_error (err, rspamd_proxy_quark (), 100,
  424. "mirror option must be an object");
  425. return FALSE;
  426. }
  427. up = rspamd_mempool_alloc0 (pool, sizeof (*up));
  428. elt = ucl_object_lookup (obj, "name");
  429. if (elt == NULL) {
  430. if (ucl_object_key (obj)) {
  431. if (strcmp (ucl_object_key (obj), "mirror") == 0) {
  432. /* Iterate over the object and find upstream elements */
  433. ucl_object_iter_t it = NULL;
  434. const ucl_object_t *cur;
  435. gboolean ret = TRUE;
  436. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  437. if (!rspamd_proxy_parse_mirror (pool, cur, ud,
  438. section, err)) {
  439. ret = FALSE;
  440. }
  441. }
  442. return ret;
  443. }
  444. else {
  445. /* Inside upstream */
  446. up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
  447. }
  448. }
  449. else {
  450. g_set_error (err, rspamd_proxy_quark (), 100,
  451. "mirror option must have some name definition");
  452. return FALSE;
  453. }
  454. }
  455. else {
  456. up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  457. }
  458. up->parser_to_ref = -1;
  459. up->parser_from_ref = -1;
  460. up->timeout = ctx->timeout;
  461. elt = ucl_object_lookup (obj, "key");
  462. if (elt != NULL) {
  463. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  464. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  465. if (up->key == NULL) {
  466. g_set_error (err, rspamd_proxy_quark (), 100,
  467. "cannot read mirror key");
  468. goto err;
  469. }
  470. rspamd_mempool_add_destructor (pool,
  471. (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
  472. }
  473. elt = ucl_object_lookup (obj, "hosts");
  474. if (elt == NULL) {
  475. g_set_error (err, rspamd_proxy_quark (), 100,
  476. "mirror option must have some hosts definition");
  477. goto err;
  478. }
  479. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  480. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  481. g_set_error (err, rspamd_proxy_quark (), 100,
  482. "mirror has bad hosts definition");
  483. goto err;
  484. }
  485. rspamd_mempool_add_destructor (pool,
  486. (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
  487. elt = ucl_object_lookup_any (obj, "probability", "prob", NULL);
  488. if (elt) {
  489. up->prob = ucl_object_todouble (elt);
  490. }
  491. else {
  492. up->prob = 1.0;
  493. }
  494. elt = ucl_object_lookup (obj, "local");
  495. if (elt && ucl_object_toboolean (elt)) {
  496. up->local = TRUE;
  497. }
  498. elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
  499. if (elt && ucl_object_toboolean (elt)) {
  500. up->compress = TRUE;
  501. }
  502. elt = ucl_object_lookup (obj, "timeout");
  503. if (elt) {
  504. ucl_object_todouble_safe (elt, &up->timeout);
  505. }
  506. /*
  507. * Accept lua function here in form
  508. * fun :: String -> UCL
  509. */
  510. elt = ucl_object_lookup (obj, "parser");
  511. if (elt) {
  512. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  513. &up->parser_to_ref, err)) {
  514. goto err;
  515. }
  516. rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
  517. rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
  518. }
  519. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  520. if (elt && ucl_object_type (elt) == UCL_STRING) {
  521. up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  522. }
  523. g_ptr_array_add (ctx->mirrors, up);
  524. return TRUE;
  525. err:
  526. return FALSE;
  527. }
  528. static gboolean
  529. rspamd_proxy_parse_script (rspamd_mempool_t *pool,
  530. const ucl_object_t *obj,
  531. gpointer ud,
  532. struct rspamd_rcl_section *section,
  533. GError **err)
  534. {
  535. struct rspamd_proxy_ctx *ctx;
  536. struct rspamd_rcl_struct_parser *pd = ud;
  537. lua_State *L;
  538. const gchar *lua_script;
  539. gsize slen;
  540. gint err_idx, ref_idx;
  541. struct stat st;
  542. ctx = pd->user_struct;
  543. L = ctx->lua_state;
  544. if (ucl_object_type (obj) != UCL_STRING) {
  545. g_set_error (err, rspamd_proxy_quark (), 100,
  546. "script option must be a string with file or lua chunk");
  547. return FALSE;
  548. }
  549. lua_script = ucl_object_tolstring (obj, &slen);
  550. lua_pushcfunction (L, &rspamd_lua_traceback);
  551. err_idx = lua_gettop (L);
  552. if (stat (lua_script, &st) != -1) {
  553. /* Load file */
  554. if (luaL_loadfile (L, lua_script) != 0) {
  555. g_set_error (err,
  556. rspamd_proxy_quark (),
  557. EINVAL,
  558. "cannot load lua parser script: %s",
  559. lua_tostring (L, -1));
  560. lua_settop (L, 0); /* Error function */
  561. goto err;
  562. }
  563. }
  564. else {
  565. /* Load data directly */
  566. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  567. g_set_error (err,
  568. rspamd_proxy_quark (),
  569. EINVAL,
  570. "cannot load lua parser script: %s",
  571. lua_tostring (L, -1));
  572. lua_settop (L, 0); /* Error function */
  573. goto err;
  574. }
  575. }
  576. /* Now do it */
  577. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  578. g_set_error (err,
  579. rspamd_proxy_quark (),
  580. EINVAL,
  581. "cannot init lua parser script: %s",
  582. lua_tostring (L, -1));
  583. lua_settop (L, 0);
  584. goto err;
  585. }
  586. if (!lua_isfunction (L, -1)) {
  587. g_set_error (err,
  588. rspamd_proxy_quark (),
  589. EINVAL,
  590. "cannot init lua parser script: "
  591. "must return function, %s returned",
  592. lua_typename (L, lua_type (L, -1)));
  593. lua_settop (L, 0);
  594. goto err;
  595. }
  596. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  597. lua_settop (L, 0);
  598. g_array_append_val (ctx->cmp_refs, ref_idx);
  599. return TRUE;
  600. err:
  601. return FALSE;
  602. }
  603. gpointer
  604. init_rspamd_proxy (struct rspamd_config *cfg)
  605. {
  606. struct rspamd_proxy_ctx *ctx;
  607. GQuark type;
  608. type = g_quark_try_string ("rspamd_proxy");
  609. ctx = rspamd_mempool_alloc0 (cfg->cfg_pool,
  610. sizeof (struct rspamd_proxy_ctx));
  611. ctx->magic = rspamd_rspamd_proxy_magic;
  612. ctx->timeout = 120.0;
  613. ctx->upstreams = g_hash_table_new (rspamd_strcase_hash, rspamd_strcase_equal);
  614. rspamd_mempool_add_destructor (cfg->cfg_pool,
  615. (rspamd_mempool_destruct_t)g_hash_table_unref, ctx->upstreams);
  616. ctx->mirrors = g_ptr_array_new ();
  617. rspamd_mempool_add_destructor (cfg->cfg_pool,
  618. (rspamd_mempool_destruct_t)rspamd_ptr_array_free_hard, ctx->mirrors);
  619. ctx->cfg = cfg;
  620. ctx->lua_state = cfg->lua_state;
  621. ctx->cmp_refs = g_array_new (FALSE, FALSE, sizeof (gint));
  622. rspamd_mempool_add_destructor (cfg->cfg_pool,
  623. (rspamd_mempool_destruct_t)rspamd_array_free_hard, ctx->cmp_refs);
  624. ctx->max_retries = DEFAULT_RETRIES;
  625. ctx->spam_header = RSPAMD_MILTER_SPAM_HEADER;
  626. rspamd_rcl_register_worker_option (cfg,
  627. type,
  628. "timeout",
  629. rspamd_rcl_parse_struct_time,
  630. ctx,
  631. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, timeout),
  632. RSPAMD_CL_FLAG_TIME_FLOAT,
  633. "IO timeout");
  634. rspamd_rcl_register_worker_option (cfg,
  635. type,
  636. "keypair",
  637. rspamd_rcl_parse_struct_keypair,
  638. ctx,
  639. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, key),
  640. 0,
  641. "Server's keypair");
  642. rspamd_rcl_register_worker_option (cfg,
  643. type,
  644. "upstream",
  645. rspamd_proxy_parse_upstream,
  646. ctx,
  647. 0,
  648. 0,
  649. "List of upstreams");
  650. rspamd_rcl_register_worker_option (cfg,
  651. type,
  652. "mirror",
  653. rspamd_proxy_parse_mirror,
  654. ctx,
  655. 0,
  656. RSPAMD_CL_FLAG_MULTIPLE,
  657. "List of mirrors");
  658. rspamd_rcl_register_worker_option (cfg,
  659. type,
  660. "script",
  661. rspamd_proxy_parse_script,
  662. ctx,
  663. 0,
  664. RSPAMD_CL_FLAG_MULTIPLE,
  665. "Compare script to be executed");
  666. rspamd_rcl_register_worker_option (cfg,
  667. type,
  668. "max_retries",
  669. rspamd_rcl_parse_struct_integer,
  670. ctx,
  671. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, max_retries),
  672. RSPAMD_CL_FLAG_UINT,
  673. "Maximum number of retries for master connection");
  674. rspamd_rcl_register_worker_option (cfg,
  675. type,
  676. "milter",
  677. rspamd_rcl_parse_struct_boolean,
  678. ctx,
  679. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, milter),
  680. 0,
  681. "Accept milter connections, not HTTP");
  682. rspamd_rcl_register_worker_option (cfg,
  683. type,
  684. "discard_on_reject",
  685. rspamd_rcl_parse_struct_boolean,
  686. ctx,
  687. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, discard_on_reject),
  688. 0,
  689. "Tell MTA to discard rejected messages silently");
  690. rspamd_rcl_register_worker_option (cfg,
  691. type,
  692. "quarantine_on_reject",
  693. rspamd_rcl_parse_struct_boolean,
  694. ctx,
  695. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, quarantine_on_reject),
  696. 0,
  697. "Tell MTA to quarantine rejected messages");
  698. rspamd_rcl_register_worker_option (cfg,
  699. type,
  700. "spam_header",
  701. rspamd_rcl_parse_struct_string,
  702. ctx,
  703. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, spam_header),
  704. 0,
  705. "Use the specific spam header (default: X-Spam)");
  706. rspamd_rcl_register_worker_option (cfg,
  707. type,
  708. "client_ca_name",
  709. rspamd_rcl_parse_struct_string,
  710. ctx,
  711. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, client_ca_name),
  712. 0,
  713. "Allow certificates issued by this CA to be treated as client certificates");
  714. rspamd_rcl_register_worker_option (cfg,
  715. type,
  716. "reject_message",
  717. rspamd_rcl_parse_struct_string,
  718. ctx,
  719. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, reject_message),
  720. 0,
  721. "Use custom rejection message");
  722. return ctx;
  723. }
  724. static void
  725. proxy_backend_close_connection (struct rspamd_proxy_backend_connection *conn)
  726. {
  727. if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  728. if (conn->backend_conn) {
  729. rspamd_http_connection_reset (conn->backend_conn);
  730. rspamd_http_connection_unref (conn->backend_conn);
  731. close (conn->backend_sock);
  732. }
  733. conn->flags |= RSPAMD_BACKEND_CLOSED;
  734. }
  735. }
  736. static gboolean
  737. proxy_backend_parse_results (struct rspamd_proxy_session *session,
  738. struct rspamd_proxy_backend_connection *conn,
  739. lua_State *L, gint parser_ref,
  740. struct rspamd_http_message *msg,
  741. goffset *body_offset,
  742. const rspamd_ftok_t *ct)
  743. {
  744. struct ucl_parser *parser;
  745. gint err_idx;
  746. const gchar *in = msg->body_buf.begin;
  747. gsize inlen = msg->body_buf.len;
  748. const rspamd_ftok_t *offset_hdr;
  749. if (inlen == 0 || in == NULL) {
  750. return FALSE;
  751. }
  752. offset_hdr = rspamd_http_message_find_header (msg, MESSAGE_OFFSET_HEADER);
  753. if (offset_hdr) {
  754. gulong val;
  755. if (rspamd_strtoul (offset_hdr->begin, offset_hdr->len, &val)
  756. && val < inlen) {
  757. if (body_offset) {
  758. *body_offset = val;
  759. }
  760. inlen = val;
  761. }
  762. }
  763. if (parser_ref != -1) {
  764. /* Call parser function */
  765. lua_pushcfunction (L, &rspamd_lua_traceback);
  766. err_idx = lua_gettop (L);
  767. lua_rawgeti (L, LUA_REGISTRYINDEX, parser_ref);
  768. /* XXX: copies all data */
  769. lua_pushlstring (L, in, inlen);
  770. if (lua_pcall (L, 1, 1, err_idx) != 0) {
  771. msg_err_session (
  772. "cannot run lua parser script: %s",
  773. lua_tostring (L, -1));
  774. lua_settop (L, 0);
  775. return FALSE;
  776. }
  777. conn->results = ucl_object_lua_import (L, -1);
  778. lua_settop (L, 0);
  779. }
  780. else {
  781. rspamd_ftok_t json_ct;
  782. RSPAMD_FTOK_ASSIGN (&json_ct, "application/json");
  783. if (ct && rspamd_ftok_casecmp (ct, &json_ct) == 0) {
  784. parser = ucl_parser_new (0);
  785. if (!ucl_parser_add_chunk (parser, in, inlen)) {
  786. gchar *encoded;
  787. encoded = rspamd_encode_base64 (in, inlen, 0, NULL);
  788. msg_err_session ("cannot parse input: %s", ucl_parser_get_error (
  789. parser));
  790. msg_err_session ("input encoded: %s", encoded);
  791. ucl_parser_free (parser);
  792. g_free (encoded);
  793. return FALSE;
  794. }
  795. conn->results = ucl_parser_get_object (parser);
  796. ucl_parser_free (parser);
  797. }
  798. }
  799. return TRUE;
  800. }
  801. static void
  802. proxy_call_cmp_script (struct rspamd_proxy_session *session, gint cbref)
  803. {
  804. gint err_idx;
  805. guint i;
  806. struct rspamd_proxy_backend_connection *conn;
  807. lua_State *L;
  808. L = session->ctx->lua_state;
  809. lua_pushcfunction (L, &rspamd_lua_traceback);
  810. err_idx = lua_gettop (L);
  811. lua_rawgeti (L, LUA_REGISTRYINDEX, cbref);
  812. lua_createtable (L, 0, session->mirror_conns->len + 1);
  813. /* Now push master results */
  814. if (session->master_conn && session->master_conn->results) {
  815. lua_pushstring (L, "master");
  816. ucl_object_push_lua (L, session->master_conn->results, true);
  817. lua_settable (L, -3);
  818. }
  819. else {
  820. lua_pushstring (L, "master");
  821. lua_pushstring (L, "no results");
  822. lua_settable (L, -3);
  823. }
  824. for (i = 0; i < session->mirror_conns->len; i ++) {
  825. conn = g_ptr_array_index (session->mirror_conns, i);
  826. if (conn->results) {
  827. lua_pushstring (L, conn->name);
  828. ucl_object_push_lua (L, conn->results, true);
  829. lua_settable (L, -3);
  830. }
  831. else {
  832. lua_pushstring (L, conn->name);
  833. lua_pushstring (L, conn->err ? conn->err : "unknown error");
  834. lua_settable (L, -3);
  835. }
  836. }
  837. if (lua_pcall (L, 1, 0, err_idx) != 0) {
  838. msg_err_session (
  839. "cannot run lua compare script: %s",
  840. lua_tostring (L, -1));
  841. }
  842. lua_settop (L, 0);
  843. }
  844. static void
  845. proxy_session_dtor (struct rspamd_proxy_session *session)
  846. {
  847. guint i;
  848. gint cbref;
  849. struct rspamd_proxy_backend_connection *conn;
  850. if (session->master_conn && session->master_conn->results) {
  851. for (i = 0; i < session->ctx->cmp_refs->len; i++) {
  852. cbref = g_array_index (session->ctx->cmp_refs, gint, i);
  853. proxy_call_cmp_script (session, cbref);
  854. }
  855. }
  856. if (session->master_conn) {
  857. proxy_backend_close_connection (session->master_conn);
  858. }
  859. if (session->client_milter_conn) {
  860. rspamd_milter_session_unref (session->client_milter_conn);
  861. }
  862. else if (session->client_conn) {
  863. rspamd_http_connection_reset (session->client_conn);
  864. rspamd_http_connection_unref (session->client_conn);
  865. }
  866. if (session->map && session->map_len) {
  867. munmap (session->map, session->map_len);
  868. }
  869. for (i = 0; i < session->mirror_conns->len; i ++) {
  870. conn = g_ptr_array_index (session->mirror_conns, i);
  871. if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  872. proxy_backend_close_connection (conn);
  873. }
  874. if (conn->results) {
  875. ucl_object_unref (conn->results);
  876. }
  877. }
  878. if (session->master_conn) {
  879. if (session->master_conn->results) {
  880. ucl_object_unref (session->master_conn->results);
  881. }
  882. if (session->master_conn->task) {
  883. rspamd_session_destroy (session->master_conn->task->s);
  884. }
  885. }
  886. g_ptr_array_free (session->mirror_conns, TRUE);
  887. rspamd_http_message_shmem_unref (session->shmem_ref);
  888. rspamd_http_message_unref (session->client_message);
  889. if (session->client_addr) {
  890. rspamd_inet_address_free (session->client_addr);
  891. }
  892. if (session->client_sock != -1) {
  893. close (session->client_sock);
  894. }
  895. if (session->ctx->sessions_cache) {
  896. rspamd_worker_session_cache_remove (session->ctx->sessions_cache,
  897. session);
  898. }
  899. if (session->pool) {
  900. rspamd_mempool_delete (session->pool);
  901. }
  902. g_free (session);
  903. }
  904. static void
  905. proxy_request_compress (struct rspamd_http_message *msg)
  906. {
  907. guint flags;
  908. ZSTD_CCtx *zctx;
  909. rspamd_fstring_t *body;
  910. const gchar *in;
  911. gsize inlen;
  912. flags = rspamd_http_message_get_flags (msg);
  913. if (!rspamd_http_message_find_header (msg, COMPRESSION_HEADER)) {
  914. if ((flags & RSPAMD_HTTP_FLAG_SHMEM) ||
  915. !(flags & RSPAMD_HTTP_FLAG_HAS_BODY)) {
  916. /* Cannot compress shared or empty message */
  917. return;
  918. }
  919. in = rspamd_http_message_get_body (msg, &inlen);
  920. if (in == NULL || inlen == 0) {
  921. return;
  922. }
  923. body = rspamd_fstring_sized_new (ZSTD_compressBound (inlen));
  924. zctx = ZSTD_createCCtx ();
  925. body->len = ZSTD_compressCCtx (zctx, body->str, body->allocated,
  926. in, inlen, 1);
  927. if (ZSTD_isError (body->len)) {
  928. msg_err ("compression error");
  929. rspamd_fstring_free (body);
  930. ZSTD_freeCCtx (zctx);
  931. return;
  932. }
  933. ZSTD_freeCCtx (zctx);
  934. rspamd_http_message_set_body_from_fstring_steal (msg, body);
  935. rspamd_http_message_add_header (msg, COMPRESSION_HEADER, "zstd");
  936. }
  937. }
  938. static void
  939. proxy_request_decompress (struct rspamd_http_message *msg)
  940. {
  941. rspamd_fstring_t *body;
  942. const gchar *in;
  943. gsize inlen, outlen, r;
  944. ZSTD_DStream *zstream;
  945. ZSTD_inBuffer zin;
  946. ZSTD_outBuffer zout;
  947. if (rspamd_http_message_find_header (msg, COMPRESSION_HEADER)) {
  948. in = rspamd_http_message_get_body (msg, &inlen);
  949. if (in == NULL || inlen == 0) {
  950. return;
  951. }
  952. zstream = ZSTD_createDStream ();
  953. ZSTD_initDStream (zstream);
  954. zin.pos = 0;
  955. zin.src = in;
  956. zin.size = inlen;
  957. if ((outlen = ZSTD_getDecompressedSize (zin.src, zin.size)) == 0) {
  958. outlen = ZSTD_DStreamOutSize ();
  959. }
  960. body = rspamd_fstring_sized_new (outlen);
  961. zout.dst = body->str;
  962. zout.pos = 0;
  963. zout.size = outlen;
  964. while (zin.pos < zin.size) {
  965. r = ZSTD_decompressStream (zstream, &zout, &zin);
  966. if (ZSTD_isError (r)) {
  967. msg_err ("Decompression error: %s", ZSTD_getErrorName (r));
  968. ZSTD_freeDStream (zstream);
  969. rspamd_fstring_free (body);
  970. return;
  971. }
  972. if (zout.pos == zout.size) {
  973. /* We need to extend output buffer */
  974. zout.size = zout.size * 2 + 1;
  975. body = rspamd_fstring_grow (body, zout.size);
  976. zout.size = body->allocated;
  977. zout.dst = body->str;
  978. }
  979. }
  980. body->len = zout.pos;
  981. ZSTD_freeDStream (zstream);
  982. rspamd_http_message_set_body_from_fstring_steal (msg, body);
  983. rspamd_http_message_remove_header (msg, COMPRESSION_HEADER);
  984. }
  985. }
  986. static struct rspamd_proxy_session *
  987. proxy_session_refresh (struct rspamd_proxy_session *session)
  988. {
  989. struct rspamd_proxy_session *nsession;
  990. nsession = g_malloc0 (sizeof (*nsession));
  991. nsession->client_milter_conn = session->client_milter_conn;
  992. session->client_milter_conn = NULL;
  993. rspamd_milter_update_userdata (nsession->client_milter_conn,
  994. nsession);
  995. nsession->client_addr = session->client_addr;
  996. session->client_addr = NULL;
  997. nsession->ctx = session->ctx;
  998. nsession->worker = session->worker;
  999. nsession->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (), "proxy", 0);
  1000. nsession->client_sock = session->client_sock;
  1001. session->client_sock = -1;
  1002. nsession->mirror_conns = g_ptr_array_sized_new (nsession->ctx->mirrors->len);
  1003. REF_INIT_RETAIN (nsession, proxy_session_dtor);
  1004. if (nsession->ctx->sessions_cache) {
  1005. rspamd_worker_session_cache_add (nsession->ctx->sessions_cache,
  1006. nsession->pool->tag.uid, &nsession->ref.refcount, nsession);
  1007. }
  1008. return nsession;
  1009. }
  1010. static gboolean
  1011. proxy_check_file (struct rspamd_http_message *msg,
  1012. struct rspamd_proxy_session *session)
  1013. {
  1014. const rspamd_ftok_t *tok, *key_tok;
  1015. rspamd_ftok_t srch;
  1016. gchar *file_str;
  1017. GHashTable *query_args;
  1018. GHashTableIter it;
  1019. gpointer k, v;
  1020. struct http_parser_url u;
  1021. rspamd_fstring_t *new_url;
  1022. tok = rspamd_http_message_find_header (msg, "File");
  1023. if (tok) {
  1024. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  1025. session->map = rspamd_file_xmap (file_str, PROT_READ, &session->map_len,
  1026. TRUE);
  1027. if (session->map == NULL) {
  1028. if (session->map_len != 0) {
  1029. msg_err_session ("cannot map %s: %s", file_str,
  1030. strerror (errno));
  1031. return FALSE;
  1032. }
  1033. }
  1034. /* Remove header after processing */
  1035. rspamd_http_message_remove_header (msg, "File");
  1036. session->fname = file_str;
  1037. }
  1038. else {
  1039. /* Need to parse query URL */
  1040. if (http_parser_parse_url (RSPAMD_FSTRING_DATA (msg->url),
  1041. RSPAMD_FSTRING_LEN (msg->url), 0, &u) != 0) {
  1042. msg_err_session ("bad request url: %V", msg->url);
  1043. return FALSE;
  1044. }
  1045. if (u.field_set & (1 << UF_QUERY)) {
  1046. /* In case if we have a query, we need to store it somewhere */
  1047. query_args = rspamd_http_message_parse_query (msg);
  1048. srch.begin = "File";
  1049. srch.len = strlen ("File");
  1050. tok = g_hash_table_lookup (query_args, &srch);
  1051. if (tok) {
  1052. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  1053. session->map = rspamd_file_xmap (file_str, PROT_READ,
  1054. &session->map_len, TRUE);
  1055. if (session->map == NULL) {
  1056. if (session->map_len != 0) {
  1057. msg_err_session ("cannot map %s: %s", file_str,
  1058. strerror (errno));
  1059. g_hash_table_unref (query_args);
  1060. return FALSE;
  1061. }
  1062. }
  1063. /* We need to create a new URL with file attribute removed */
  1064. new_url = rspamd_fstring_new_init (RSPAMD_FSTRING_DATA (msg->url),
  1065. u.field_data[UF_QUERY].off);
  1066. new_url = rspamd_fstring_append (new_url, "?", 1);
  1067. g_hash_table_iter_init (&it, query_args);
  1068. while (g_hash_table_iter_next (&it, &k, &v)) {
  1069. key_tok = k;
  1070. tok = v;
  1071. if (!rspamd_ftok_icase_equal (key_tok, &srch)) {
  1072. rspamd_printf_fstring (&new_url, "%T=%T&",
  1073. key_tok, tok);
  1074. }
  1075. }
  1076. /* Erase last character (might be either & or ?) */
  1077. rspamd_fstring_erase (new_url, new_url->len - 1, 1);
  1078. rspamd_fstring_free (msg->url);
  1079. msg->url = new_url;
  1080. session->fname = file_str;
  1081. }
  1082. g_hash_table_unref (query_args);
  1083. }
  1084. }
  1085. return TRUE;
  1086. }
  1087. static void
  1088. proxy_backend_mirror_error_handler (struct rspamd_http_connection *conn, GError *err)
  1089. {
  1090. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1091. struct rspamd_proxy_session *session;
  1092. session = bk_conn->s;
  1093. msg_info_session ("abnormally closing connection from backend: %s:%s, "
  1094. "error: %e",
  1095. bk_conn->name,
  1096. rspamd_inet_address_to_string_pretty (
  1097. rspamd_upstream_addr_cur (bk_conn->up)),
  1098. err);
  1099. if (err) {
  1100. bk_conn->err = rspamd_mempool_strdup (session->pool, err->message);
  1101. }
  1102. rspamd_upstream_fail (bk_conn->up, FALSE, err ? err->message : "unknown");
  1103. proxy_backend_close_connection (bk_conn);
  1104. REF_RELEASE (bk_conn->s);
  1105. }
  1106. static gint
  1107. proxy_backend_mirror_finish_handler (struct rspamd_http_connection *conn,
  1108. struct rspamd_http_message *msg)
  1109. {
  1110. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1111. struct rspamd_proxy_session *session;
  1112. const rspamd_ftok_t *orig_ct;
  1113. session = bk_conn->s;
  1114. proxy_request_decompress (msg);
  1115. orig_ct = rspamd_http_message_find_header (msg, "Content-Type");
  1116. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  1117. bk_conn->parser_from_ref, msg, NULL, orig_ct)) {
  1118. msg_warn_session ("cannot parse results from the mirror backend %s:%s",
  1119. bk_conn->name,
  1120. rspamd_inet_address_to_string (
  1121. rspamd_upstream_addr_cur (bk_conn->up)));
  1122. bk_conn->err = "cannot parse ucl";
  1123. }
  1124. msg_info_session ("finished mirror connection to %s", bk_conn->name);
  1125. rspamd_upstream_ok (bk_conn->up);
  1126. proxy_backend_close_connection (bk_conn);
  1127. REF_RELEASE (bk_conn->s);
  1128. return 0;
  1129. }
  1130. static void
  1131. proxy_open_mirror_connections (struct rspamd_proxy_session *session)
  1132. {
  1133. gdouble coin;
  1134. struct rspamd_http_mirror *m;
  1135. guint i;
  1136. struct rspamd_proxy_backend_connection *bk_conn;
  1137. struct rspamd_http_message *msg;
  1138. GError *err = NULL;
  1139. coin = rspamd_random_double ();
  1140. for (i = 0; i < session->ctx->mirrors->len; i ++) {
  1141. m = g_ptr_array_index (session->ctx->mirrors, i);
  1142. if (m->prob < coin) {
  1143. /* No luck */
  1144. continue;
  1145. }
  1146. bk_conn = rspamd_mempool_alloc0 (session->pool,
  1147. sizeof (*bk_conn));
  1148. bk_conn->s = session;
  1149. bk_conn->name = m->name;
  1150. bk_conn->timeout = m->timeout;
  1151. bk_conn->up = rspamd_upstream_get (m->u,
  1152. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1153. bk_conn->parser_from_ref = m->parser_from_ref;
  1154. bk_conn->parser_to_ref = m->parser_to_ref;
  1155. if (bk_conn->up == NULL) {
  1156. msg_err_session ("cannot select upstream for %s", m->name);
  1157. continue;
  1158. }
  1159. bk_conn->backend_sock = rspamd_inet_address_connect (
  1160. rspamd_upstream_addr_next (bk_conn->up),
  1161. SOCK_STREAM, TRUE);
  1162. if (bk_conn->backend_sock == -1) {
  1163. msg_err_session ("cannot connect upstream for %s", m->name);
  1164. rspamd_upstream_fail (bk_conn->up, TRUE, strerror (errno));
  1165. continue;
  1166. }
  1167. msg = rspamd_http_connection_copy_msg (session->client_message, &err);
  1168. if (msg == NULL) {
  1169. msg_err_session ("cannot copy message to send to a mirror %s: %e",
  1170. m->name, err);
  1171. if (err) {
  1172. g_error_free (err);
  1173. }
  1174. continue;
  1175. }
  1176. if (msg->url->len == 0) {
  1177. msg->url = rspamd_fstring_append (msg->url, "/check", strlen ("/check"));
  1178. }
  1179. if (m->settings_id != NULL) {
  1180. rspamd_http_message_remove_header (msg, "Settings-ID");
  1181. rspamd_http_message_add_header (msg, "Settings-ID", m->settings_id);
  1182. }
  1183. bk_conn->backend_conn = rspamd_http_connection_new_client_socket (
  1184. session->ctx->http_ctx,
  1185. NULL,
  1186. proxy_backend_mirror_error_handler,
  1187. proxy_backend_mirror_finish_handler,
  1188. RSPAMD_HTTP_CLIENT_SIMPLE,
  1189. bk_conn->backend_sock);
  1190. if (m->key) {
  1191. msg->peer_key = rspamd_pubkey_ref (m->key);
  1192. }
  1193. if (m->local ||
  1194. rspamd_inet_address_is_local (rspamd_upstream_addr_cur (bk_conn->up))) {
  1195. if (session->fname) {
  1196. rspamd_http_message_add_header (msg, "File", session->fname);
  1197. }
  1198. msg->method = HTTP_GET;
  1199. rspamd_http_connection_write_message_shared (bk_conn->backend_conn,
  1200. msg, NULL, NULL, bk_conn,
  1201. bk_conn->timeout);
  1202. }
  1203. else {
  1204. if (session->fname) {
  1205. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1206. rspamd_http_message_set_body (msg, session->map, session->map_len);
  1207. }
  1208. msg->method = HTTP_POST;
  1209. if (m->compress) {
  1210. proxy_request_compress (msg);
  1211. if (session->client_milter_conn) {
  1212. rspamd_http_message_add_header (msg, "Content-Type",
  1213. "application/octet-stream");
  1214. }
  1215. }
  1216. else {
  1217. if (session->client_milter_conn) {
  1218. rspamd_http_message_add_header (msg, "Content-Type",
  1219. "text/plain");
  1220. }
  1221. }
  1222. rspamd_http_connection_write_message (bk_conn->backend_conn,
  1223. msg, NULL, NULL, bk_conn,
  1224. bk_conn->timeout);
  1225. }
  1226. g_ptr_array_add (session->mirror_conns, bk_conn);
  1227. REF_RETAIN (session);
  1228. msg_info_session ("send request to %s", m->name);
  1229. }
  1230. }
  1231. static void
  1232. proxy_client_write_error (struct rspamd_proxy_session *session, gint code,
  1233. const gchar *status)
  1234. {
  1235. struct rspamd_http_message *reply;
  1236. if (session->client_milter_conn) {
  1237. rspamd_milter_send_action (session->client_milter_conn,
  1238. RSPAMD_MILTER_TEMPFAIL);
  1239. REF_RELEASE (session);
  1240. }
  1241. else {
  1242. reply = rspamd_http_new_message (HTTP_RESPONSE);
  1243. switch (code) {
  1244. case ETIMEDOUT:
  1245. reply->code = 504;
  1246. reply->status = RSPAMD_FSTRING_LIT ("Gateway timeout");
  1247. break;
  1248. case ECONNRESET:
  1249. case ECONNABORTED:
  1250. reply->code = 502;
  1251. reply->status = RSPAMD_FSTRING_LIT ("Gateway connection reset");
  1252. break;
  1253. case ECONNREFUSED:
  1254. reply->code = 502;
  1255. reply->status = RSPAMD_FSTRING_LIT ("Gateway connection refused");
  1256. break;
  1257. default:
  1258. if (code >= 300) {
  1259. /* Likely HTTP error */
  1260. reply->code = code;
  1261. reply->status = rspamd_fstring_new_init (status, strlen (status));
  1262. }
  1263. else {
  1264. reply->code = 502;
  1265. reply->status = RSPAMD_FSTRING_LIT ("Unknown gateway error: ");
  1266. reply->status = rspamd_fstring_append (reply->status,
  1267. status, strlen (status));
  1268. }
  1269. break;
  1270. }
  1271. rspamd_http_connection_write_message (session->client_conn,
  1272. reply, NULL, NULL, session,
  1273. session->ctx->timeout);
  1274. }
  1275. }
  1276. static void
  1277. proxy_backend_master_error_handler (struct rspamd_http_connection *conn, GError *err)
  1278. {
  1279. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1280. struct rspamd_proxy_session *session;
  1281. session = bk_conn->s;
  1282. session->retries ++;
  1283. msg_info_session ("abnormally closing connection from backend: %s, error: %e,"
  1284. " retries left: %d",
  1285. rspamd_inet_address_to_string_pretty (
  1286. rspamd_upstream_addr_cur (session->master_conn->up)),
  1287. err,
  1288. session->ctx->max_retries - session->retries);
  1289. rspamd_upstream_fail (bk_conn->up, FALSE, err ? err->message : "unknown");
  1290. proxy_backend_close_connection (session->master_conn);
  1291. if (session->ctx->max_retries > 0 &&
  1292. session->retries >= session->ctx->max_retries) {
  1293. msg_err_session ("cannot connect to upstream, maximum retries "
  1294. "has been reached: %d", session->retries);
  1295. /* Terminate session immediately */
  1296. if (err) {
  1297. proxy_client_write_error(session, err->code, err->message);
  1298. }
  1299. else {
  1300. proxy_client_write_error(session, 503, "Unknown error after no retries left");
  1301. }
  1302. }
  1303. else {
  1304. if (!proxy_send_master_message (session)) {
  1305. if (err) {
  1306. proxy_client_write_error(session, err->code, err->message);
  1307. }
  1308. else {
  1309. proxy_client_write_error(session, 503, "Unknown error on write");
  1310. }
  1311. }
  1312. else {
  1313. msg_info_session ("retry connection to: %s"
  1314. " retries left: %d",
  1315. rspamd_inet_address_to_string (
  1316. rspamd_upstream_addr_cur (session->master_conn->up)),
  1317. session->ctx->max_retries - session->retries);
  1318. }
  1319. }
  1320. }
  1321. static gint
  1322. proxy_backend_master_finish_handler (struct rspamd_http_connection *conn,
  1323. struct rspamd_http_message *msg)
  1324. {
  1325. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1326. struct rspamd_proxy_session *session, *nsession;
  1327. rspamd_fstring_t *reply;
  1328. const rspamd_ftok_t *orig_ct;
  1329. goffset body_offset = -1;
  1330. session = bk_conn->s;
  1331. rspamd_http_connection_steal_msg (session->master_conn->backend_conn);
  1332. proxy_request_decompress (msg);
  1333. /*
  1334. * These are likely set by an http library, so we will double these headers
  1335. * if they are not removed
  1336. */
  1337. rspamd_http_message_remove_header (msg, "Content-Length");
  1338. rspamd_http_message_remove_header (msg, "Connection");
  1339. rspamd_http_message_remove_header (msg, "Date");
  1340. rspamd_http_message_remove_header (msg, "Server");
  1341. rspamd_http_message_remove_header (msg, "Key");
  1342. orig_ct = rspamd_http_message_find_header (msg, "Content-Type");
  1343. rspamd_http_connection_reset (session->master_conn->backend_conn);
  1344. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  1345. bk_conn->parser_from_ref, msg, &body_offset, orig_ct)) {
  1346. msg_warn_session ("cannot parse results from the master backend");
  1347. }
  1348. if (session->legacy_support > LEGACY_SUPPORT_NO) {
  1349. /* We need to reformat ucl to fit with legacy spamc protocol */
  1350. if (bk_conn->results) {
  1351. reply = rspamd_fstring_new ();
  1352. if (session->legacy_support == LEGACY_SUPPORT_SPAMC) {
  1353. rspamd_ucl_tospamc_output (bk_conn->results, &reply);
  1354. msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
  1355. }
  1356. else {
  1357. rspamd_ucl_torspamc_output (bk_conn->results, &reply);
  1358. }
  1359. rspamd_http_message_set_body_from_fstring_steal (msg, reply);
  1360. msg->method = HTTP_SYMBOLS;
  1361. }
  1362. else {
  1363. msg_warn_session ("cannot parse results from the master backend, "
  1364. "return them as is");
  1365. }
  1366. }
  1367. rspamd_upstream_ok (bk_conn->up);
  1368. if (session->client_milter_conn) {
  1369. nsession = proxy_session_refresh (session);
  1370. if (body_offset > 0) {
  1371. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1372. session->master_conn->results,
  1373. msg->body_buf.begin + body_offset,
  1374. msg->body_buf.len - body_offset);
  1375. }
  1376. else {
  1377. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1378. session->master_conn->results, NULL, 0);
  1379. }
  1380. REF_RELEASE (session);
  1381. rspamd_http_message_free (msg);
  1382. }
  1383. else {
  1384. const gchar *passed_ct = NULL;
  1385. if (orig_ct) {
  1386. passed_ct = rspamd_mempool_ftokdup (session->pool, orig_ct);
  1387. /* Remove original */
  1388. rspamd_http_message_remove_header (msg, "Content-Type");
  1389. }
  1390. rspamd_http_connection_write_message (session->client_conn,
  1391. msg, NULL, passed_ct, session,
  1392. bk_conn->timeout);
  1393. }
  1394. return 0;
  1395. }
  1396. static void
  1397. rspamd_proxy_scan_self_reply (struct rspamd_task *task)
  1398. {
  1399. struct rspamd_http_message *msg;
  1400. struct rspamd_proxy_session *session = task->fin_arg, *nsession;
  1401. ucl_object_t *rep = NULL;
  1402. const char *ctype = "application/json";
  1403. msg = rspamd_http_new_message (HTTP_RESPONSE);
  1404. msg->date = time (NULL);
  1405. msg->code = 200;
  1406. switch (task->cmd) {
  1407. case CMD_CHECK:
  1408. case CMD_SKIP:
  1409. case CMD_CHECK_RSPAMC:
  1410. case CMD_CHECK_SPAMC:
  1411. case CMD_CHECK_V2:
  1412. rspamd_task_set_finish_time (task);
  1413. rspamd_protocol_http_reply (msg, task, &rep);
  1414. rspamd_protocol_write_log_pipe (task);
  1415. break;
  1416. case CMD_PING:
  1417. rspamd_http_message_set_body (msg, "pong" CRLF, 6);
  1418. ctype = "text/plain";
  1419. break;
  1420. default:
  1421. msg_err_task ("BROKEN");
  1422. break;
  1423. }
  1424. session->master_conn->flags |= RSPAMD_BACKEND_CLOSED;
  1425. if (rep) {
  1426. session->master_conn->results = ucl_object_ref (rep);
  1427. }
  1428. if (session->client_milter_conn) {
  1429. nsession = proxy_session_refresh (session);
  1430. if (task->flags & RSPAMD_TASK_FLAG_MESSAGE_REWRITE) {
  1431. const gchar *start;
  1432. goffset len, hdr_off;
  1433. start = task->msg.begin;
  1434. len = task->msg.len;
  1435. hdr_off = MESSAGE_FIELD (task, raw_headers_content).len;
  1436. if (hdr_off < len) {
  1437. start += hdr_off;
  1438. len -= hdr_off;
  1439. /* The problem here is that we need not end of headers, we need
  1440. * start of body.
  1441. *
  1442. * Hence, we need to skip one \r\n till there is anything else in
  1443. * a line.
  1444. */
  1445. if (*start == '\r' && len > 0) {
  1446. start++;
  1447. len--;
  1448. }
  1449. if (*start == '\n' && len > 0) {
  1450. start++;
  1451. len--;
  1452. }
  1453. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1454. session->master_conn->results, start, len);
  1455. }
  1456. else {
  1457. /* XXX: should never happen! */
  1458. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1459. session->master_conn->results, NULL, 0);
  1460. }
  1461. }
  1462. else {
  1463. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1464. session->master_conn->results, NULL, 0);
  1465. }
  1466. rspamd_http_message_free (msg);
  1467. REF_RELEASE (session);
  1468. }
  1469. else {
  1470. rspamd_http_connection_reset (session->client_conn);
  1471. rspamd_http_connection_write_message (session->client_conn,
  1472. msg,
  1473. NULL,
  1474. ctype,
  1475. session,
  1476. session->ctx->timeout / 10.0);
  1477. }
  1478. }
  1479. static gboolean
  1480. rspamd_proxy_task_fin (void *ud)
  1481. {
  1482. struct rspamd_task *task = ud;
  1483. msg_debug_task ("finish task");
  1484. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  1485. rspamd_proxy_scan_self_reply (task);
  1486. return TRUE;
  1487. }
  1488. if (!rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL)) {
  1489. rspamd_proxy_scan_self_reply (task);
  1490. return TRUE;
  1491. }
  1492. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  1493. rspamd_proxy_scan_self_reply (task);
  1494. return TRUE;
  1495. }
  1496. /* One more iteration */
  1497. return FALSE;
  1498. }
  1499. static gboolean
  1500. rspamd_proxy_self_scan (struct rspamd_proxy_session *session)
  1501. {
  1502. struct rspamd_task *task;
  1503. struct rspamd_http_message *msg;
  1504. const gchar *data;
  1505. gsize len;
  1506. msg = session->client_message;
  1507. task = rspamd_task_new (session->worker, session->ctx->cfg,
  1508. session->pool, session->ctx->lang_det,
  1509. session->ctx->event_loop, FALSE);
  1510. task->flags |= RSPAMD_TASK_FLAG_MIME;
  1511. if (session->ctx->milter) {
  1512. task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_MILTER|
  1513. RSPAMD_TASK_PROTOCOL_FLAG_BODY_BLOCK;
  1514. }
  1515. task->sock = -1;
  1516. if (session->client_milter_conn) {
  1517. task->client_addr = rspamd_inet_address_copy (
  1518. session->client_milter_conn->addr);
  1519. }
  1520. else {
  1521. task->client_addr = rspamd_inet_address_copy (session->client_addr);
  1522. }
  1523. task->fin_arg = session;
  1524. task->resolver = session->ctx->resolver;
  1525. /* TODO: allow to disable autolearn in protocol */
  1526. task->flags |= RSPAMD_TASK_FLAG_LEARN_AUTO;
  1527. task->s = rspamd_session_create (task->task_pool, rspamd_proxy_task_fin,
  1528. NULL, (event_finalizer_t )rspamd_task_free, task);
  1529. data = rspamd_http_message_get_body (msg, &len);
  1530. if (session->backend->settings_id) {
  1531. rspamd_http_message_remove_header (msg, "Settings-ID");
  1532. rspamd_http_message_add_header (msg, "Settings-ID",
  1533. session->backend->settings_id);
  1534. }
  1535. /* Process message */
  1536. if (!rspamd_protocol_handle_request (task, msg)) {
  1537. msg_err_task ("cannot handle request: %e", task->err);
  1538. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1539. }
  1540. else {
  1541. if (task->cmd == CMD_PING) {
  1542. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1543. }
  1544. else {
  1545. if (!rspamd_task_load_message (task, msg, data, len)) {
  1546. msg_err_task ("cannot load message: %e", task->err);
  1547. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1548. }
  1549. }
  1550. }
  1551. /* Set global timeout for the task */
  1552. if (session->ctx->default_upstream->timeout > 0.0) {
  1553. task->timeout_ev.data = task;
  1554. ev_timer_init (&task->timeout_ev, rspamd_task_timeout,
  1555. session->ctx->default_upstream->timeout,
  1556. session->ctx->default_upstream->timeout);
  1557. ev_timer_start (task->event_loop, &task->timeout_ev);
  1558. }
  1559. else if (session->ctx->has_self_scan) {
  1560. if (session->ctx->cfg->task_timeout > 0) {
  1561. task->timeout_ev.data = task;
  1562. ev_timer_init (&task->timeout_ev, rspamd_task_timeout,
  1563. session->ctx->cfg->task_timeout,
  1564. session->ctx->default_upstream->timeout);
  1565. ev_timer_start (task->event_loop, &task->timeout_ev);
  1566. }
  1567. }
  1568. session->master_conn->task = task;
  1569. rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL);
  1570. rspamd_session_pending (task->s);
  1571. return TRUE;
  1572. }
  1573. static gboolean
  1574. proxy_send_master_message (struct rspamd_proxy_session *session)
  1575. {
  1576. struct rspamd_http_message *msg;
  1577. struct rspamd_http_upstream *backend = NULL;
  1578. const rspamd_ftok_t *host;
  1579. GError *err = NULL;
  1580. gchar hostbuf[512];
  1581. host = rspamd_http_message_find_header (session->client_message, "Host");
  1582. if (host == NULL) {
  1583. backend = session->ctx->default_upstream;
  1584. }
  1585. else {
  1586. rspamd_strlcpy (hostbuf, host->begin, MIN(host->len + 1, sizeof (hostbuf)));
  1587. backend = g_hash_table_lookup (session->ctx->upstreams, hostbuf);
  1588. if (backend == NULL) {
  1589. backend = session->ctx->default_upstream;
  1590. }
  1591. }
  1592. if (backend == NULL) {
  1593. /* No backend */
  1594. msg_err_session ("cannot find upstream for %s", host ? hostbuf : "default");
  1595. goto err;
  1596. }
  1597. else {
  1598. session->backend = backend;
  1599. if (backend->self_scan) {
  1600. return rspamd_proxy_self_scan (session);
  1601. }
  1602. retry:
  1603. if (session->ctx->max_retries &&
  1604. session->retries > session->ctx->max_retries) {
  1605. msg_err_session ("cannot connect to upstream, maximum retries "
  1606. "has been reached: %d", session->retries);
  1607. goto err;
  1608. }
  1609. /* Provide hash key if hashing based on source address is desired */
  1610. guint hash_len;
  1611. gpointer hash_key = rspamd_inet_address_get_hash_key (session->client_addr,
  1612. &hash_len);
  1613. if (session->ctx->max_retries > 1 &&
  1614. session->retries == session->ctx->max_retries) {
  1615. session->master_conn->up = rspamd_upstream_get_except (backend->u,
  1616. session->master_conn->up,
  1617. RSPAMD_UPSTREAM_ROUND_ROBIN,
  1618. hash_key, hash_len);
  1619. }
  1620. else {
  1621. session->master_conn->up = rspamd_upstream_get (backend->u,
  1622. RSPAMD_UPSTREAM_ROUND_ROBIN,
  1623. hash_key, hash_len);
  1624. }
  1625. session->master_conn->timeout = backend->timeout;
  1626. if (session->master_conn->up == NULL) {
  1627. msg_err_session ("cannot select upstream for %s",
  1628. host ? hostbuf : "default");
  1629. goto err;
  1630. }
  1631. session->master_conn->backend_sock = rspamd_inet_address_connect (
  1632. rspamd_upstream_addr_next (session->master_conn->up),
  1633. SOCK_STREAM, TRUE);
  1634. if (session->master_conn->backend_sock == -1) {
  1635. msg_err_session ("cannot connect upstream: %s(%s)",
  1636. host ? hostbuf : "default",
  1637. rspamd_inet_address_to_string_pretty (
  1638. rspamd_upstream_addr_cur (
  1639. session->master_conn->up)));
  1640. rspamd_upstream_fail (session->master_conn->up, TRUE,
  1641. strerror (errno));
  1642. session->retries ++;
  1643. goto retry;
  1644. }
  1645. msg = rspamd_http_connection_copy_msg (session->client_message, &err);
  1646. if (msg == NULL) {
  1647. msg_err_session ("cannot copy message to send it to the upstream: %e",
  1648. err);
  1649. if (err) {
  1650. g_error_free (err);
  1651. }
  1652. goto err; /* No fallback here */
  1653. }
  1654. session->master_conn->backend_conn = rspamd_http_connection_new_client_socket (
  1655. session->ctx->http_ctx,
  1656. NULL,
  1657. proxy_backend_master_error_handler,
  1658. proxy_backend_master_finish_handler,
  1659. RSPAMD_HTTP_CLIENT_SIMPLE,
  1660. session->master_conn->backend_sock);
  1661. session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED;
  1662. session->master_conn->parser_from_ref = backend->parser_from_ref;
  1663. session->master_conn->parser_to_ref = backend->parser_to_ref;
  1664. if (backend->key) {
  1665. msg->peer_key = rspamd_pubkey_ref (backend->key);
  1666. }
  1667. if (backend->settings_id != NULL) {
  1668. rspamd_http_message_remove_header (msg, "Settings-ID");
  1669. rspamd_http_message_add_header (msg, "Settings-ID",
  1670. backend->settings_id);
  1671. }
  1672. if (backend->local ||
  1673. rspamd_inet_address_is_local (
  1674. rspamd_upstream_addr_cur (
  1675. session->master_conn->up))) {
  1676. if (session->fname) {
  1677. rspamd_http_message_add_header (msg, "File", session->fname);
  1678. }
  1679. msg->method = HTTP_GET;
  1680. rspamd_http_connection_write_message_shared (
  1681. session->master_conn->backend_conn,
  1682. msg, NULL, NULL, session->master_conn,
  1683. session->master_conn->timeout);
  1684. }
  1685. else {
  1686. if (session->fname) {
  1687. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1688. rspamd_http_message_set_body (msg,
  1689. session->map, session->map_len);
  1690. }
  1691. msg->method = HTTP_POST;
  1692. if (backend->compress) {
  1693. proxy_request_compress (msg);
  1694. if (session->client_milter_conn) {
  1695. rspamd_http_message_add_header (msg, "Content-Type",
  1696. "application/octet-stream");
  1697. }
  1698. }
  1699. else {
  1700. if (session->client_milter_conn) {
  1701. rspamd_http_message_add_header (msg, "Content-Type",
  1702. "text/plain");
  1703. }
  1704. }
  1705. rspamd_http_connection_write_message (
  1706. session->master_conn->backend_conn,
  1707. msg, NULL, NULL, session->master_conn,
  1708. session->master_conn->timeout);
  1709. }
  1710. }
  1711. return TRUE;
  1712. err:
  1713. if (session->client_milter_conn) {
  1714. rspamd_milter_send_action (session->client_milter_conn,
  1715. RSPAMD_MILTER_TEMPFAIL);
  1716. REF_RELEASE (session);
  1717. }
  1718. else {
  1719. rspamd_http_connection_steal_msg (session->client_conn);
  1720. rspamd_http_connection_reset (session->client_conn);
  1721. proxy_client_write_error (session, 404, "Backend not found");
  1722. }
  1723. return FALSE;
  1724. }
  1725. static void
  1726. proxy_client_error_handler (struct rspamd_http_connection *conn, GError *err)
  1727. {
  1728. struct rspamd_proxy_session *session = conn->ud;
  1729. msg_info_session ("abnormally closing connection from: %s, error: %s",
  1730. rspamd_inet_address_to_string (session->client_addr), err->message);
  1731. /* Terminate session immediately */
  1732. proxy_backend_close_connection (session->master_conn);
  1733. REF_RELEASE (session);
  1734. }
  1735. static gint
  1736. proxy_client_finish_handler (struct rspamd_http_connection *conn,
  1737. struct rspamd_http_message *msg)
  1738. {
  1739. struct rspamd_proxy_session *session = conn->ud;
  1740. if (!session->master_conn) {
  1741. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1742. sizeof (*session->master_conn));
  1743. session->master_conn->s = session;
  1744. session->master_conn->name = "master";
  1745. /* Reset spamc legacy */
  1746. if (msg->method >= HTTP_SYMBOLS) {
  1747. msg->method = HTTP_POST;
  1748. if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) {
  1749. session->legacy_support = LEGACY_SUPPORT_SPAMC;
  1750. msg_info_session ("enabling legacy spamc mode for session");
  1751. }
  1752. else {
  1753. session->legacy_support = LEGACY_SUPPORT_RSPAMC;
  1754. msg_info_session ("enabling legacy rspamc mode for session");
  1755. }
  1756. }
  1757. if (msg->url->len == 0) {
  1758. msg->url = rspamd_fstring_append (msg->url,
  1759. "/" MSG_CMD_CHECK_V2, strlen ("/" MSG_CMD_CHECK_V2));
  1760. }
  1761. if (!proxy_check_file (msg, session)) {
  1762. goto err;
  1763. }
  1764. session->client_message = rspamd_http_connection_steal_msg (
  1765. session->client_conn);
  1766. session->shmem_ref = rspamd_http_message_shmem_ref (session->client_message);
  1767. rspamd_http_message_remove_header (msg, "Content-Length");
  1768. rspamd_http_message_remove_header (msg, "Transfer-Encoding");
  1769. rspamd_http_message_remove_header (msg, "Keep-Alive");
  1770. rspamd_http_message_remove_header (msg, "Connection");
  1771. rspamd_http_message_remove_header (msg, "Key");
  1772. proxy_open_mirror_connections (session);
  1773. rspamd_http_connection_reset (session->client_conn);
  1774. proxy_send_master_message (session);
  1775. }
  1776. else {
  1777. msg_info_session ("finished master connection");
  1778. proxy_backend_close_connection (session->master_conn);
  1779. REF_RELEASE (session);
  1780. }
  1781. return 0;
  1782. err:
  1783. rspamd_http_connection_steal_msg (session->client_conn);
  1784. rspamd_http_message_remove_header (msg, "Content-Length");
  1785. rspamd_http_message_remove_header (msg, "Key");
  1786. rspamd_http_message_remove_header (msg, "Transfer-Encoding");
  1787. rspamd_http_message_remove_header (msg, "Keep-Alive");
  1788. rspamd_http_message_remove_header (msg, "Connection");
  1789. rspamd_http_connection_reset (session->client_conn);
  1790. proxy_client_write_error (session, 404, "Backend not found");
  1791. return 0;
  1792. }
  1793. static void
  1794. proxy_milter_finish_handler (gint fd,
  1795. struct rspamd_milter_session *rms,
  1796. void *ud)
  1797. {
  1798. struct rspamd_proxy_session *session = ud;
  1799. struct rspamd_http_message *msg;
  1800. session->client_milter_conn = rms;
  1801. if (rms->message == NULL || rms->message->len == 0) {
  1802. msg_info_session ("finished milter connection");
  1803. proxy_backend_close_connection (session->master_conn);
  1804. REF_RELEASE (session);
  1805. }
  1806. else {
  1807. if (!session->master_conn) {
  1808. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1809. sizeof (*session->master_conn));
  1810. }
  1811. msg = rspamd_milter_to_http (rms);
  1812. session->master_conn->s = session;
  1813. session->master_conn->name = "master";
  1814. session->client_message = msg;
  1815. proxy_open_mirror_connections (session);
  1816. proxy_send_master_message (session);
  1817. }
  1818. }
  1819. static void
  1820. proxy_milter_error_handler (gint fd,
  1821. struct rspamd_milter_session *rms, /* unused */
  1822. void *ud, GError *err)
  1823. {
  1824. struct rspamd_proxy_session *session = ud;
  1825. if (err && err->code != 0) {
  1826. msg_info_session ("abnormally closing milter connection from: %s, "
  1827. "error: %e",
  1828. rspamd_inet_address_to_string_pretty (session->client_addr),
  1829. err);
  1830. /* Terminate session immediately */
  1831. proxy_backend_close_connection (session->master_conn);
  1832. REF_RELEASE (session);
  1833. }
  1834. else {
  1835. msg_info_session ("normally closing milter connection from: %s, "
  1836. "%e",
  1837. rspamd_inet_address_to_string_pretty (session->client_addr),
  1838. err);
  1839. /* Terminate session immediately */
  1840. proxy_backend_close_connection (session->master_conn);
  1841. REF_RELEASE (session);
  1842. }
  1843. }
  1844. static void
  1845. proxy_accept_socket (EV_P_ ev_io *w, int revents)
  1846. {
  1847. struct rspamd_worker *worker = (struct rspamd_worker *)w->data;
  1848. struct rspamd_proxy_ctx *ctx;
  1849. rspamd_inet_addr_t *addr = NULL;
  1850. struct rspamd_proxy_session *session;
  1851. gint nfd;
  1852. ctx = worker->ctx;
  1853. if ((nfd =
  1854. rspamd_accept_from_socket (w->fd, &addr,
  1855. rspamd_worker_throttle_accept_events, worker->accept_events)) == -1) {
  1856. msg_warn ("accept failed: %s", strerror (errno));
  1857. return;
  1858. }
  1859. /* Check for EAGAIN */
  1860. if (nfd == 0) {
  1861. rspamd_inet_address_free (addr);
  1862. return;
  1863. }
  1864. session = g_malloc0 (sizeof (*session));
  1865. REF_INIT_RETAIN (session, proxy_session_dtor);
  1866. session->client_sock = nfd;
  1867. session->client_addr = addr;
  1868. session->mirror_conns = g_ptr_array_sized_new (ctx->mirrors->len);
  1869. session->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (),
  1870. "proxy", 0);
  1871. session->ctx = ctx;
  1872. session->worker = worker;
  1873. if (ctx->sessions_cache) {
  1874. rspamd_worker_session_cache_add (ctx->sessions_cache,
  1875. session->pool->tag.uid, &session->ref.refcount, session);
  1876. }
  1877. if (!ctx->milter) {
  1878. session->client_conn = rspamd_http_connection_new_server (
  1879. ctx->http_ctx,
  1880. nfd,
  1881. NULL,
  1882. proxy_client_error_handler,
  1883. proxy_client_finish_handler,
  1884. 0);
  1885. if (ctx->key) {
  1886. rspamd_http_connection_set_key (session->client_conn, ctx->key);
  1887. }
  1888. msg_info_session ("accepted http connection from %s port %d",
  1889. rspamd_inet_address_to_string (addr),
  1890. rspamd_inet_address_get_port (addr));
  1891. rspamd_http_connection_read_message_shared (session->client_conn,
  1892. session,
  1893. session->ctx->timeout);
  1894. }
  1895. else {
  1896. msg_info_session ("accepted milter connection from %s port %d",
  1897. rspamd_inet_address_to_string (addr),
  1898. rspamd_inet_address_get_port (addr));
  1899. #ifdef TCP_NODELAY
  1900. #ifndef SOL_TCP
  1901. #define SOL_TCP IPPROTO_TCP
  1902. #endif
  1903. if (rspamd_inet_address_get_af (addr) != AF_UNIX) {
  1904. gint sopt = 1;
  1905. if (setsockopt (nfd, SOL_TCP, TCP_NODELAY, &sopt, sizeof (sopt)) ==
  1906. -1) {
  1907. msg_warn_session ("cannot set TCP_NODELAY: %s",
  1908. strerror (errno));
  1909. }
  1910. }
  1911. #endif
  1912. rspamd_milter_handle_socket (nfd, 0.0,
  1913. session->pool,
  1914. ctx->event_loop,
  1915. proxy_milter_finish_handler,
  1916. proxy_milter_error_handler,
  1917. session);
  1918. }
  1919. }
  1920. static void
  1921. adjust_upstreams_limits (struct rspamd_proxy_ctx *ctx)
  1922. {
  1923. struct rspamd_http_upstream *backend;
  1924. gpointer k, v;
  1925. GHashTableIter it;
  1926. /*
  1927. * We set error time equal to max_retries * backend_timeout and max_errors
  1928. * to max_retries - 1
  1929. *
  1930. * So if we failed to scan a message on a backend for some reasons, we
  1931. * will try to re-resolve it faster
  1932. */
  1933. g_hash_table_iter_init (&it, ctx->upstreams);
  1934. while (g_hash_table_iter_next (&it, &k, &v)) {
  1935. backend = (struct rspamd_http_upstream *)v;
  1936. if (!backend->self_scan && backend->u) {
  1937. rspamd_upstreams_set_limits (backend->u,
  1938. NAN, NAN, ctx->max_retries * backend->timeout, NAN,
  1939. ctx->max_retries - 1, 0);
  1940. }
  1941. }
  1942. }
  1943. __attribute__((noreturn))
  1944. void
  1945. start_rspamd_proxy (struct rspamd_worker *worker)
  1946. {
  1947. struct rspamd_proxy_ctx *ctx = worker->ctx;
  1948. gboolean is_controller = FALSE;
  1949. g_assert (rspamd_worker_check_context (worker->ctx, rspamd_rspamd_proxy_magic));
  1950. ctx->cfg = worker->srv->cfg;
  1951. ctx->event_loop = rspamd_prepare_worker (worker, "rspamd_proxy",
  1952. proxy_accept_socket);
  1953. ctx->resolver = rspamd_dns_resolver_init (worker->srv->logger,
  1954. ctx->event_loop,
  1955. worker->srv->cfg);
  1956. rspamd_upstreams_library_config (worker->srv->cfg, ctx->cfg->ups_ctx,
  1957. ctx->event_loop, ctx->resolver->r);
  1958. ctx->http_ctx = rspamd_http_context_create (ctx->cfg, ctx->event_loop,
  1959. ctx->cfg->ups_ctx);
  1960. rspamd_mempool_add_destructor (ctx->cfg->cfg_pool,
  1961. (rspamd_mempool_destruct_t)rspamd_http_context_free,
  1962. ctx->http_ctx);
  1963. if (ctx->has_self_scan) {
  1964. /* Additional initialisation needed */
  1965. rspamd_worker_init_scanner (worker, ctx->event_loop, ctx->resolver,
  1966. &ctx->lang_det);
  1967. if (worker->index == 0) {
  1968. /*
  1969. * If there are no controllers and no normal workers,
  1970. * then pretend that we are a controller
  1971. */
  1972. gboolean controller_seen = FALSE;
  1973. GList *cur;
  1974. cur = worker->srv->cfg->workers;
  1975. while (cur) {
  1976. struct rspamd_worker_conf *cf;
  1977. cf = (struct rspamd_worker_conf *)cur->data;
  1978. if ((cf->type == g_quark_from_static_string ("controller")) ||
  1979. (cf->type == g_quark_from_static_string ("normal"))) {
  1980. if (cf->enabled && cf->count >= 0) {
  1981. controller_seen = TRUE;
  1982. break;
  1983. }
  1984. }
  1985. cur = g_list_next (cur);
  1986. }
  1987. if (!controller_seen) {
  1988. msg_info ("no controller or normal workers defined, execute "
  1989. "controller periodics in this worker");
  1990. worker->flags |= RSPAMD_WORKER_CONTROLLER;
  1991. is_controller = TRUE;
  1992. }
  1993. }
  1994. }
  1995. else {
  1996. worker->flags &= ~RSPAMD_WORKER_SCANNER;
  1997. }
  1998. if (worker->srv->cfg->enable_sessions_cache) {
  1999. ctx->sessions_cache = rspamd_worker_session_cache_new (worker,
  2000. ctx->event_loop);
  2001. }
  2002. ctx->milter_ctx.spam_header = ctx->spam_header;
  2003. ctx->milter_ctx.discard_on_reject = ctx->discard_on_reject;
  2004. ctx->milter_ctx.quarantine_on_reject = ctx->quarantine_on_reject;
  2005. ctx->milter_ctx.sessions_cache = ctx->sessions_cache;
  2006. ctx->milter_ctx.client_ca_name = ctx->client_ca_name;
  2007. ctx->milter_ctx.reject_message = ctx->reject_message;
  2008. ctx->milter_ctx.cfg = ctx->cfg;
  2009. rspamd_milter_init_library (&ctx->milter_ctx);
  2010. if (is_controller) {
  2011. rspamd_worker_init_controller (worker, NULL);
  2012. }
  2013. else {
  2014. if (ctx->has_self_scan) {
  2015. rspamd_map_watch (worker->srv->cfg, ctx->event_loop, ctx->resolver,
  2016. worker, RSPAMD_MAP_WATCH_SCANNER);
  2017. }
  2018. else {
  2019. rspamd_map_watch (worker->srv->cfg, ctx->event_loop, ctx->resolver,
  2020. worker, RSPAMD_MAP_WATCH_WORKER);
  2021. }
  2022. }
  2023. rspamd_lua_run_postloads (ctx->cfg->lua_state, ctx->cfg, ctx->event_loop,
  2024. worker);
  2025. adjust_upstreams_limits (ctx);
  2026. ev_loop (ctx->event_loop, 0);
  2027. rspamd_worker_block_signals ();
  2028. if (ctx->has_self_scan) {
  2029. rspamd_stat_close ();
  2030. }
  2031. if (is_controller) {
  2032. rspamd_controller_on_terminate (worker, NULL);
  2033. }
  2034. REF_RELEASE (ctx->cfg);
  2035. rspamd_log_close (worker->srv->logger);
  2036. exit (EXIT_SUCCESS);
  2037. }