You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd_control.c 35KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330
  1. /*
  2. * Copyright 2023 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "rspamd.h"
  18. #include "rspamd_control.h"
  19. #include "worker_util.h"
  20. #include "libserver/http/http_connection.h"
  21. #include "libserver/http/http_private.h"
  22. #include "libutil/libev_helper.h"
  23. #include "unix-std.h"
  24. #include "utlist.h"
  25. #ifdef HAVE_SYS_RESOURCE_H
  26. #include <sys/resource.h>
  27. #endif
  28. #ifdef WITH_HYPERSCAN
  29. #include "hyperscan_tools.h"
  30. #endif
  31. static ev_tstamp io_timeout = 30.0;
  32. static ev_tstamp worker_io_timeout = 0.5;
  33. struct rspamd_control_session;
  34. struct rspamd_control_reply_elt {
  35. struct rspamd_control_reply reply;
  36. struct rspamd_io_ev ev;
  37. struct ev_loop *event_loop;
  38. GQuark wrk_type;
  39. pid_t wrk_pid;
  40. gpointer ud;
  41. gint attached_fd;
  42. GHashTable *pending_elts;
  43. struct rspamd_control_reply_elt *prev, *next;
  44. };
  45. struct rspamd_control_session {
  46. gint fd;
  47. struct ev_loop *event_loop;
  48. struct rspamd_main *rspamd_main;
  49. struct rspamd_http_connection *conn;
  50. struct rspamd_control_command cmd;
  51. struct rspamd_control_reply_elt *replies;
  52. rspamd_inet_addr_t *addr;
  53. guint replies_remain;
  54. gboolean is_reply;
  55. };
  56. static const struct rspamd_control_cmd_match {
  57. rspamd_ftok_t name;
  58. enum rspamd_control_type type;
  59. } cmd_matches[] = {
  60. {.name = {
  61. .begin = "/stat",
  62. .len = sizeof("/stat") - 1},
  63. .type = RSPAMD_CONTROL_STAT},
  64. {.name = {.begin = "/reload", .len = sizeof("/reload") - 1}, .type = RSPAMD_CONTROL_RELOAD},
  65. {.name = {.begin = "/reresolve", .len = sizeof("/reresolve") - 1}, .type = RSPAMD_CONTROL_RERESOLVE},
  66. {.name = {.begin = "/recompile", .len = sizeof("/recompile") - 1}, .type = RSPAMD_CONTROL_RECOMPILE},
  67. {.name = {.begin = "/fuzzystat", .len = sizeof("/fuzzystat") - 1}, .type = RSPAMD_CONTROL_FUZZY_STAT},
  68. {.name = {.begin = "/fuzzysync", .len = sizeof("/fuzzysync") - 1}, .type = RSPAMD_CONTROL_FUZZY_SYNC},
  69. };
  70. static void rspamd_control_ignore_io_handler(int fd, short what, void *ud);
  71. static void
  72. rspamd_control_stop_pending(struct rspamd_control_reply_elt *elt)
  73. {
  74. GHashTable *htb;
  75. /* It stops event and frees hash */
  76. htb = elt->pending_elts;
  77. g_hash_table_remove(elt->pending_elts, elt);
  78. /* Release hash reference */
  79. g_hash_table_unref(htb);
  80. }
  81. void rspamd_control_send_error(struct rspamd_control_session *session,
  82. gint code, const gchar *error_msg, ...)
  83. {
  84. struct rspamd_http_message *msg;
  85. rspamd_fstring_t *reply;
  86. va_list args;
  87. msg = rspamd_http_new_message(HTTP_RESPONSE);
  88. va_start(args, error_msg);
  89. msg->status = rspamd_fstring_new();
  90. rspamd_vprintf_fstring(&msg->status, error_msg, args);
  91. va_end(args);
  92. msg->date = time(NULL);
  93. msg->code = code;
  94. reply = rspamd_fstring_sized_new(msg->status->len + 16);
  95. rspamd_printf_fstring(&reply, "{\"error\":\"%V\"}", msg->status);
  96. rspamd_http_message_set_body_from_fstring_steal(msg, reply);
  97. rspamd_http_connection_reset(session->conn);
  98. rspamd_http_connection_write_message(session->conn,
  99. msg,
  100. NULL,
  101. "application/json",
  102. session,
  103. io_timeout);
  104. }
  105. static void
  106. rspamd_control_send_ucl(struct rspamd_control_session *session,
  107. ucl_object_t *obj)
  108. {
  109. struct rspamd_http_message *msg;
  110. rspamd_fstring_t *reply;
  111. msg = rspamd_http_new_message(HTTP_RESPONSE);
  112. msg->date = time(NULL);
  113. msg->code = 200;
  114. msg->status = rspamd_fstring_new_init("OK", 2);
  115. reply = rspamd_fstring_sized_new(BUFSIZ);
  116. rspamd_ucl_emit_fstring(obj, UCL_EMIT_JSON_COMPACT, &reply);
  117. rspamd_http_message_set_body_from_fstring_steal(msg, reply);
  118. rspamd_http_connection_reset(session->conn);
  119. rspamd_http_connection_write_message(session->conn,
  120. msg,
  121. NULL,
  122. "application/json",
  123. session,
  124. io_timeout);
  125. }
  126. static void
  127. rspamd_control_connection_close(struct rspamd_control_session *session)
  128. {
  129. struct rspamd_control_reply_elt *elt, *telt;
  130. struct rspamd_main *rspamd_main;
  131. rspamd_main = session->rspamd_main;
  132. msg_info_main("finished connection from %s",
  133. rspamd_inet_address_to_string(session->addr));
  134. DL_FOREACH_SAFE(session->replies, elt, telt)
  135. {
  136. rspamd_control_stop_pending(elt);
  137. }
  138. rspamd_inet_address_free(session->addr);
  139. rspamd_http_connection_unref(session->conn);
  140. close(session->fd);
  141. g_free(session);
  142. }
  143. static void
  144. rspamd_control_write_reply(struct rspamd_control_session *session)
  145. {
  146. ucl_object_t *rep, *cur, *workers;
  147. struct rspamd_control_reply_elt *elt;
  148. gchar tmpbuf[64];
  149. gdouble total_utime = 0, total_systime = 0;
  150. struct ucl_parser *parser;
  151. guint total_conns = 0;
  152. rep = ucl_object_typed_new(UCL_OBJECT);
  153. workers = ucl_object_typed_new(UCL_OBJECT);
  154. DL_FOREACH(session->replies, elt)
  155. {
  156. /* Skip incompatible worker for fuzzy_stat */
  157. if ((session->cmd.type == RSPAMD_CONTROL_FUZZY_STAT ||
  158. session->cmd.type == RSPAMD_CONTROL_FUZZY_SYNC) &&
  159. elt->wrk_type != g_quark_from_static_string("fuzzy")) {
  160. continue;
  161. }
  162. rspamd_snprintf(tmpbuf, sizeof(tmpbuf), "%P", elt->wrk_pid);
  163. cur = ucl_object_typed_new(UCL_OBJECT);
  164. ucl_object_insert_key(cur, ucl_object_fromstring(g_quark_to_string(elt->wrk_type)), "type", 0, false);
  165. switch (session->cmd.type) {
  166. case RSPAMD_CONTROL_STAT:
  167. ucl_object_insert_key(cur, ucl_object_fromint(elt->reply.reply.stat.conns), "conns", 0, false);
  168. ucl_object_insert_key(cur, ucl_object_fromdouble(elt->reply.reply.stat.utime), "utime", 0, false);
  169. ucl_object_insert_key(cur, ucl_object_fromdouble(elt->reply.reply.stat.systime), "systime", 0, false);
  170. ucl_object_insert_key(cur, ucl_object_fromdouble(elt->reply.reply.stat.uptime), "uptime", 0, false);
  171. ucl_object_insert_key(cur, ucl_object_fromint(elt->reply.reply.stat.maxrss), "maxrss", 0, false);
  172. total_utime += elt->reply.reply.stat.utime;
  173. total_systime += elt->reply.reply.stat.systime;
  174. total_conns += elt->reply.reply.stat.conns;
  175. break;
  176. case RSPAMD_CONTROL_RELOAD:
  177. ucl_object_insert_key(cur, ucl_object_fromint(elt->reply.reply.reload.status), "status", 0, false);
  178. break;
  179. case RSPAMD_CONTROL_RECOMPILE:
  180. ucl_object_insert_key(cur, ucl_object_fromint(elt->reply.reply.recompile.status), "status", 0, false);
  181. break;
  182. case RSPAMD_CONTROL_RERESOLVE:
  183. ucl_object_insert_key(cur, ucl_object_fromint(elt->reply.reply.reresolve.status), "status", 0, false);
  184. break;
  185. case RSPAMD_CONTROL_FUZZY_STAT:
  186. if (elt->attached_fd != -1) {
  187. /* We have some data to parse */
  188. parser = ucl_parser_new(0);
  189. ucl_object_insert_key(cur,
  190. ucl_object_fromint(
  191. elt->reply.reply.fuzzy_stat.status),
  192. "status",
  193. 0,
  194. false);
  195. if (ucl_parser_add_fd(parser, elt->attached_fd)) {
  196. ucl_object_insert_key(cur, ucl_parser_get_object(parser),
  197. "data", 0, false);
  198. ucl_parser_free(parser);
  199. }
  200. else {
  201. ucl_object_insert_key(cur, ucl_object_fromstring(ucl_parser_get_error(parser)), "error", 0, false);
  202. ucl_parser_free(parser);
  203. }
  204. ucl_object_insert_key(cur,
  205. ucl_object_fromlstring(
  206. elt->reply.reply.fuzzy_stat.storage_id,
  207. MEMPOOL_UID_LEN - 1),
  208. "id",
  209. 0,
  210. false);
  211. }
  212. else {
  213. ucl_object_insert_key(cur,
  214. ucl_object_fromstring("missing file"),
  215. "error",
  216. 0,
  217. false);
  218. ucl_object_insert_key(cur,
  219. ucl_object_fromint(
  220. elt->reply.reply.fuzzy_stat.status),
  221. "status",
  222. 0,
  223. false);
  224. }
  225. break;
  226. case RSPAMD_CONTROL_FUZZY_SYNC:
  227. ucl_object_insert_key(cur, ucl_object_fromint(elt->reply.reply.fuzzy_sync.status), "status", 0, false);
  228. break;
  229. default:
  230. break;
  231. }
  232. if (elt->attached_fd != -1) {
  233. close(elt->attached_fd);
  234. elt->attached_fd = -1;
  235. }
  236. ucl_object_insert_key(workers, cur, tmpbuf, 0, true);
  237. }
  238. ucl_object_insert_key(rep, workers, "workers", 0, false);
  239. if (session->cmd.type == RSPAMD_CONTROL_STAT) {
  240. /* Total stats */
  241. cur = ucl_object_typed_new(UCL_OBJECT);
  242. ucl_object_insert_key(cur, ucl_object_fromint(total_conns), "conns", 0, false);
  243. ucl_object_insert_key(cur, ucl_object_fromdouble(total_utime), "utime", 0, false);
  244. ucl_object_insert_key(cur, ucl_object_fromdouble(total_systime), "systime", 0, false);
  245. ucl_object_insert_key(rep, cur, "total", 0, false);
  246. }
  247. rspamd_control_send_ucl(session, rep);
  248. ucl_object_unref(rep);
  249. }
  250. static void
  251. rspamd_control_wrk_io(gint fd, short what, gpointer ud)
  252. {
  253. struct rspamd_control_reply_elt *elt = ud;
  254. struct rspamd_control_session *session;
  255. guchar fdspace[CMSG_SPACE(sizeof(int))];
  256. struct iovec iov;
  257. struct msghdr msg;
  258. gssize r;
  259. session = elt->ud;
  260. elt->attached_fd = -1;
  261. if (what == EV_READ) {
  262. iov.iov_base = &elt->reply;
  263. iov.iov_len = sizeof(elt->reply);
  264. memset(&msg, 0, sizeof(msg));
  265. msg.msg_control = fdspace;
  266. msg.msg_controllen = sizeof(fdspace);
  267. msg.msg_iov = &iov;
  268. msg.msg_iovlen = 1;
  269. r = recvmsg(fd, &msg, 0);
  270. if (r == -1) {
  271. msg_err("cannot read reply from the worker %P (%s): %s",
  272. elt->wrk_pid, g_quark_to_string(elt->wrk_type),
  273. strerror(errno));
  274. }
  275. else if (r >= (gssize) sizeof(elt->reply)) {
  276. if (msg.msg_controllen >= CMSG_LEN(sizeof(int))) {
  277. elt->attached_fd = *(int *) CMSG_DATA(CMSG_FIRSTHDR(&msg));
  278. }
  279. }
  280. }
  281. else {
  282. /* Timeout waiting */
  283. msg_warn("timeout waiting reply from %P (%s)",
  284. elt->wrk_pid, g_quark_to_string(elt->wrk_type));
  285. }
  286. session->replies_remain--;
  287. rspamd_ev_watcher_stop(session->event_loop,
  288. &elt->ev);
  289. if (session->replies_remain == 0) {
  290. rspamd_control_write_reply(session);
  291. }
  292. }
  293. static void
  294. rspamd_control_error_handler(struct rspamd_http_connection *conn, GError *err)
  295. {
  296. struct rspamd_control_session *session = conn->ud;
  297. struct rspamd_main *rspamd_main;
  298. rspamd_main = session->rspamd_main;
  299. if (!session->is_reply) {
  300. msg_info_main("abnormally closing control connection: %e", err);
  301. session->is_reply = TRUE;
  302. rspamd_control_send_error(session, err->code, "%s", err->message);
  303. }
  304. else {
  305. rspamd_control_connection_close(session);
  306. }
  307. }
  308. void rspamd_pending_control_free(gpointer p)
  309. {
  310. struct rspamd_control_reply_elt *rep_elt = (struct rspamd_control_reply_elt *) p;
  311. rspamd_ev_watcher_stop(rep_elt->event_loop, &rep_elt->ev);
  312. g_free(rep_elt);
  313. }
  314. static struct rspamd_control_reply_elt *
  315. rspamd_control_broadcast_cmd(struct rspamd_main *rspamd_main,
  316. struct rspamd_control_command *cmd,
  317. gint attached_fd,
  318. rspamd_ev_cb handler,
  319. gpointer ud,
  320. pid_t except_pid)
  321. {
  322. GHashTableIter it;
  323. struct rspamd_worker *wrk;
  324. struct rspamd_control_reply_elt *rep_elt, *res = NULL;
  325. gpointer k, v;
  326. struct msghdr msg;
  327. struct cmsghdr *cmsg;
  328. struct iovec iov;
  329. guchar fdspace[CMSG_SPACE(sizeof(int))];
  330. gssize r;
  331. g_hash_table_iter_init(&it, rspamd_main->workers);
  332. while (g_hash_table_iter_next(&it, &k, &v)) {
  333. wrk = v;
  334. /* No control pipe */
  335. if (wrk->control_pipe[0] == -1) {
  336. continue;
  337. }
  338. if (except_pid != 0 && wrk->pid == except_pid) {
  339. continue;
  340. }
  341. /* Worker is terminating, do not bother sending stuff */
  342. if (wrk->state == rspamd_worker_state_terminating) {
  343. continue;
  344. }
  345. memset(&msg, 0, sizeof(msg));
  346. /* Attach fd to the message */
  347. if (attached_fd != -1) {
  348. memset(fdspace, 0, sizeof(fdspace));
  349. msg.msg_control = fdspace;
  350. msg.msg_controllen = sizeof(fdspace);
  351. cmsg = CMSG_FIRSTHDR(&msg);
  352. cmsg->cmsg_level = SOL_SOCKET;
  353. cmsg->cmsg_type = SCM_RIGHTS;
  354. cmsg->cmsg_len = CMSG_LEN(sizeof(int));
  355. memcpy(CMSG_DATA(cmsg), &attached_fd, sizeof(int));
  356. }
  357. iov.iov_base = cmd;
  358. iov.iov_len = sizeof(*cmd);
  359. msg.msg_iov = &iov;
  360. msg.msg_iovlen = 1;
  361. r = sendmsg(wrk->control_pipe[0], &msg, 0);
  362. if (r == sizeof(*cmd)) {
  363. rep_elt = g_malloc0(sizeof(*rep_elt));
  364. rep_elt->wrk_pid = wrk->pid;
  365. rep_elt->wrk_type = wrk->type;
  366. rep_elt->event_loop = rspamd_main->event_loop;
  367. rep_elt->ud = ud;
  368. rep_elt->pending_elts = g_hash_table_ref(wrk->control_events_pending);
  369. rspamd_ev_watcher_init(&rep_elt->ev,
  370. wrk->control_pipe[0],
  371. EV_READ, handler,
  372. rep_elt);
  373. rspamd_ev_watcher_start(rspamd_main->event_loop,
  374. &rep_elt->ev, worker_io_timeout);
  375. g_hash_table_insert(wrk->control_events_pending, rep_elt, rep_elt);
  376. DL_APPEND(res, rep_elt);
  377. }
  378. else {
  379. msg_err_main("cannot write command %d(%z) to the worker %P(%s), fd: %d: %s",
  380. (int) cmd->type, iov.iov_len,
  381. wrk->pid,
  382. g_quark_to_string(wrk->type),
  383. wrk->control_pipe[0],
  384. strerror(errno));
  385. }
  386. }
  387. return res;
  388. }
  389. void rspamd_control_broadcast_srv_cmd(struct rspamd_main *rspamd_main,
  390. struct rspamd_control_command *cmd,
  391. pid_t except_pid)
  392. {
  393. rspamd_control_broadcast_cmd(rspamd_main, cmd, -1,
  394. rspamd_control_ignore_io_handler, NULL, except_pid);
  395. }
  396. static gint
  397. rspamd_control_finish_handler(struct rspamd_http_connection *conn,
  398. struct rspamd_http_message *msg)
  399. {
  400. struct rspamd_control_session *session = conn->ud;
  401. rspamd_ftok_t srch;
  402. guint i;
  403. gboolean found = FALSE;
  404. struct rspamd_control_reply_elt *cur;
  405. if (!session->is_reply) {
  406. if (msg->url == NULL) {
  407. rspamd_control_connection_close(session);
  408. return 0;
  409. }
  410. srch.begin = msg->url->str;
  411. srch.len = msg->url->len;
  412. session->is_reply = TRUE;
  413. for (i = 0; i < G_N_ELEMENTS(cmd_matches); i++) {
  414. if (rspamd_ftok_casecmp(&srch, &cmd_matches[i].name) == 0) {
  415. session->cmd.type = cmd_matches[i].type;
  416. found = TRUE;
  417. break;
  418. }
  419. }
  420. if (!found) {
  421. rspamd_control_send_error(session, 404, "Command not defined");
  422. }
  423. else {
  424. /* Send command to all workers */
  425. session->replies = rspamd_control_broadcast_cmd(
  426. session->rspamd_main, &session->cmd, -1,
  427. rspamd_control_wrk_io, session, 0);
  428. DL_FOREACH(session->replies, cur)
  429. {
  430. session->replies_remain++;
  431. }
  432. }
  433. }
  434. else {
  435. rspamd_control_connection_close(session);
  436. }
  437. return 0;
  438. }
  439. void rspamd_control_process_client_socket(struct rspamd_main *rspamd_main,
  440. gint fd, rspamd_inet_addr_t *addr)
  441. {
  442. struct rspamd_control_session *session;
  443. session = g_malloc0(sizeof(*session));
  444. session->fd = fd;
  445. session->conn = rspamd_http_connection_new_server(rspamd_main->http_ctx,
  446. fd,
  447. NULL,
  448. rspamd_control_error_handler,
  449. rspamd_control_finish_handler,
  450. 0);
  451. session->rspamd_main = rspamd_main;
  452. session->addr = addr;
  453. session->event_loop = rspamd_main->event_loop;
  454. rspamd_http_connection_read_message(session->conn, session,
  455. io_timeout);
  456. }
  457. struct rspamd_worker_control_data {
  458. ev_io io_ev;
  459. struct rspamd_worker *worker;
  460. struct ev_loop *ev_base;
  461. struct {
  462. rspamd_worker_control_handler handler;
  463. gpointer ud;
  464. } handlers[RSPAMD_CONTROL_MAX];
  465. };
  466. static void
  467. rspamd_control_default_cmd_handler(gint fd,
  468. gint attached_fd,
  469. struct rspamd_worker_control_data *cd,
  470. struct rspamd_control_command *cmd)
  471. {
  472. struct rspamd_control_reply rep;
  473. gssize r;
  474. struct rusage rusg;
  475. struct rspamd_config *cfg;
  476. struct rspamd_main *rspamd_main;
  477. memset(&rep, 0, sizeof(rep));
  478. rep.type = cmd->type;
  479. rspamd_main = cd->worker->srv;
  480. switch (cmd->type) {
  481. case RSPAMD_CONTROL_STAT:
  482. if (getrusage(RUSAGE_SELF, &rusg) == -1) {
  483. msg_err_main("cannot get rusage stats: %s",
  484. strerror(errno));
  485. }
  486. else {
  487. rep.reply.stat.utime = tv_to_double(&rusg.ru_utime);
  488. rep.reply.stat.systime = tv_to_double(&rusg.ru_stime);
  489. rep.reply.stat.maxrss = rusg.ru_maxrss;
  490. }
  491. rep.reply.stat.conns = cd->worker->nconns;
  492. rep.reply.stat.uptime = rspamd_get_calendar_ticks() - cd->worker->start_time;
  493. break;
  494. case RSPAMD_CONTROL_RELOAD:
  495. case RSPAMD_CONTROL_RECOMPILE:
  496. case RSPAMD_CONTROL_HYPERSCAN_LOADED:
  497. case RSPAMD_CONTROL_MONITORED_CHANGE:
  498. case RSPAMD_CONTROL_FUZZY_STAT:
  499. case RSPAMD_CONTROL_FUZZY_SYNC:
  500. case RSPAMD_CONTROL_LOG_PIPE:
  501. case RSPAMD_CONTROL_CHILD_CHANGE:
  502. case RSPAMD_CONTROL_FUZZY_BLOCKED:
  503. break;
  504. case RSPAMD_CONTROL_RERESOLVE:
  505. if (cd->worker->srv->cfg) {
  506. REF_RETAIN(cd->worker->srv->cfg);
  507. cfg = cd->worker->srv->cfg;
  508. if (cfg->ups_ctx) {
  509. msg_info_config("reresolving upstreams");
  510. rspamd_upstream_reresolve(cfg->ups_ctx);
  511. }
  512. rep.reply.reresolve.status = 0;
  513. REF_RELEASE(cfg);
  514. }
  515. else {
  516. rep.reply.reresolve.status = EINVAL;
  517. }
  518. break;
  519. default:
  520. break;
  521. }
  522. r = write(fd, &rep, sizeof(rep));
  523. if (r != sizeof(rep)) {
  524. msg_err_main("cannot write reply to the control socket: %s",
  525. strerror(errno));
  526. }
  527. if (attached_fd != -1) {
  528. close(attached_fd);
  529. }
  530. }
  531. static void
  532. rspamd_control_default_worker_handler(EV_P_ ev_io *w, int revents)
  533. {
  534. struct rspamd_worker_control_data *cd =
  535. (struct rspamd_worker_control_data *) w->data;
  536. static struct rspamd_control_command cmd;
  537. static struct msghdr msg;
  538. static struct iovec iov;
  539. static guchar fdspace[CMSG_SPACE(sizeof(int))];
  540. gint rfd = -1;
  541. gssize r;
  542. iov.iov_base = &cmd;
  543. iov.iov_len = sizeof(cmd);
  544. memset(&msg, 0, sizeof(msg));
  545. msg.msg_control = fdspace;
  546. msg.msg_controllen = sizeof(fdspace);
  547. msg.msg_iov = &iov;
  548. msg.msg_iovlen = 1;
  549. r = recvmsg(w->fd, &msg, 0);
  550. if (r == -1) {
  551. if (errno != EAGAIN && errno != EINTR) {
  552. if (errno != ECONNRESET) {
  553. /*
  554. * In case of connection reset it means that main process
  555. * has died, so do not pollute logs
  556. */
  557. msg_err("cannot read request from the control socket: %s",
  558. strerror(errno));
  559. }
  560. ev_io_stop(cd->ev_base, &cd->io_ev);
  561. close(w->fd);
  562. }
  563. }
  564. else if (r < (gint) sizeof(cmd)) {
  565. msg_err("short read of control command: %d of %d", (gint) r,
  566. (gint) sizeof(cmd));
  567. if (r == 0) {
  568. ev_io_stop(cd->ev_base, &cd->io_ev);
  569. close(w->fd);
  570. }
  571. }
  572. else if ((gint) cmd.type >= 0 && cmd.type < RSPAMD_CONTROL_MAX) {
  573. if (msg.msg_controllen >= CMSG_LEN(sizeof(int))) {
  574. rfd = *(int *) CMSG_DATA(CMSG_FIRSTHDR(&msg));
  575. }
  576. if (cd->handlers[cmd.type].handler) {
  577. cd->handlers[cmd.type].handler(cd->worker->srv,
  578. cd->worker,
  579. w->fd,
  580. rfd,
  581. &cmd,
  582. cd->handlers[cmd.type].ud);
  583. }
  584. else {
  585. rspamd_control_default_cmd_handler(w->fd, rfd, cd, &cmd);
  586. }
  587. }
  588. else {
  589. msg_err("unknown command: %d", (gint) cmd.type);
  590. }
  591. }
  592. void rspamd_control_worker_add_default_cmd_handlers(struct rspamd_worker *worker,
  593. struct ev_loop *ev_base)
  594. {
  595. struct rspamd_worker_control_data *cd;
  596. cd = g_malloc0(sizeof(*cd));
  597. cd->worker = worker;
  598. cd->ev_base = ev_base;
  599. cd->io_ev.data = cd;
  600. ev_io_init(&cd->io_ev, rspamd_control_default_worker_handler,
  601. worker->control_pipe[1], EV_READ);
  602. ev_io_start(ev_base, &cd->io_ev);
  603. worker->control_data = cd;
  604. }
  605. /**
  606. * Register custom handler for a specific control command for this worker
  607. */
  608. void rspamd_control_worker_add_cmd_handler(struct rspamd_worker *worker,
  609. enum rspamd_control_type type,
  610. rspamd_worker_control_handler handler,
  611. gpointer ud)
  612. {
  613. struct rspamd_worker_control_data *cd;
  614. g_assert(type >= 0 && type < RSPAMD_CONTROL_MAX);
  615. g_assert(handler != NULL);
  616. g_assert(worker->control_data != NULL);
  617. cd = worker->control_data;
  618. cd->handlers[type].handler = handler;
  619. cd->handlers[type].ud = ud;
  620. }
  621. struct rspamd_srv_reply_data {
  622. struct rspamd_worker *worker;
  623. struct rspamd_main *srv;
  624. gint fd;
  625. struct rspamd_srv_reply rep;
  626. };
  627. static void
  628. rspamd_control_ignore_io_handler(int fd, short what, void *ud)
  629. {
  630. struct rspamd_control_reply_elt *elt =
  631. (struct rspamd_control_reply_elt *) ud;
  632. struct rspamd_control_reply rep;
  633. /* At this point we just ignore replies from the workers */
  634. if (read(fd, &rep, sizeof(rep)) == -1) {
  635. msg_debug("cannot read %d bytes: %s", (int) sizeof(rep), strerror(errno));
  636. }
  637. rspamd_control_stop_pending(elt);
  638. }
  639. static void
  640. rspamd_control_log_pipe_io_handler(int fd, short what, void *ud)
  641. {
  642. struct rspamd_control_reply_elt *elt =
  643. (struct rspamd_control_reply_elt *) ud;
  644. struct rspamd_control_reply rep;
  645. /* At this point we just ignore replies from the workers */
  646. (void) !read(fd, &rep, sizeof(rep));
  647. rspamd_control_stop_pending(elt);
  648. }
  649. static void
  650. rspamd_control_handle_on_fork(struct rspamd_srv_command *cmd,
  651. struct rspamd_main *srv)
  652. {
  653. struct rspamd_worker *parent, *child;
  654. parent = g_hash_table_lookup(srv->workers,
  655. GSIZE_TO_POINTER(cmd->cmd.on_fork.ppid));
  656. if (parent == NULL) {
  657. msg_err("cannot find parent for a forked process %P (%P child)",
  658. cmd->cmd.on_fork.ppid, cmd->cmd.on_fork.cpid);
  659. return;
  660. }
  661. if (cmd->cmd.on_fork.state == child_dead) {
  662. /* We need to remove stale worker */
  663. child = g_hash_table_lookup(srv->workers,
  664. GSIZE_TO_POINTER(cmd->cmd.on_fork.cpid));
  665. if (child == NULL) {
  666. msg_err("cannot find child for a forked process %P (%P parent)",
  667. cmd->cmd.on_fork.cpid, cmd->cmd.on_fork.ppid);
  668. return;
  669. }
  670. REF_RELEASE(child->cf);
  671. g_hash_table_remove(srv->workers,
  672. GSIZE_TO_POINTER(cmd->cmd.on_fork.cpid));
  673. g_hash_table_unref(child->control_events_pending);
  674. g_free(child);
  675. }
  676. else {
  677. child = g_malloc0(sizeof(struct rspamd_worker));
  678. child->srv = srv;
  679. child->type = parent->type;
  680. child->pid = cmd->cmd.on_fork.cpid;
  681. child->srv_pipe[0] = -1;
  682. child->srv_pipe[1] = -1;
  683. child->control_pipe[0] = -1;
  684. child->control_pipe[1] = -1;
  685. child->cf = parent->cf;
  686. child->ppid = parent->pid;
  687. REF_RETAIN(child->cf);
  688. child->control_events_pending = g_hash_table_new_full(g_direct_hash, g_direct_equal,
  689. NULL, rspamd_pending_control_free);
  690. g_hash_table_insert(srv->workers,
  691. GSIZE_TO_POINTER(cmd->cmd.on_fork.cpid), child);
  692. }
  693. }
  694. static void
  695. rspamd_fill_health_reply(struct rspamd_main *srv, struct rspamd_srv_reply *rep)
  696. {
  697. GHashTableIter it;
  698. gpointer k, v;
  699. memset(&rep->reply.health, 0, sizeof(rep->reply));
  700. g_hash_table_iter_init(&it, srv->workers);
  701. while (g_hash_table_iter_next(&it, &k, &v)) {
  702. struct rspamd_worker *wrk = (struct rspamd_worker *) v;
  703. if (wrk->hb.nbeats < 0) {
  704. rep->reply.health.workers_hb_lost++;
  705. }
  706. else if (rspamd_worker_is_scanner(wrk)) {
  707. rep->reply.health.scanners_count++;
  708. }
  709. rep->reply.health.workers_count++;
  710. }
  711. rep->reply.status = (g_hash_table_size(srv->workers) > 0);
  712. }
  713. static void
  714. rspamd_srv_handler(EV_P_ ev_io *w, int revents)
  715. {
  716. struct rspamd_worker *worker;
  717. static struct rspamd_srv_command cmd;
  718. struct rspamd_main *rspamd_main;
  719. struct rspamd_srv_reply_data *rdata;
  720. struct msghdr msg;
  721. struct cmsghdr *cmsg;
  722. static struct iovec iov;
  723. static guchar fdspace[CMSG_SPACE(sizeof(int))];
  724. gint *spair, rfd = -1;
  725. gchar *nid;
  726. struct rspamd_control_command wcmd;
  727. gssize r;
  728. if (revents == EV_READ) {
  729. worker = (struct rspamd_worker *) w->data;
  730. rspamd_main = worker->srv;
  731. iov.iov_base = &cmd;
  732. iov.iov_len = sizeof(cmd);
  733. memset(&msg, 0, sizeof(msg));
  734. msg.msg_control = fdspace;
  735. msg.msg_controllen = sizeof(fdspace);
  736. msg.msg_iov = &iov;
  737. msg.msg_iovlen = 1;
  738. r = recvmsg(w->fd, &msg, 0);
  739. if (r == -1) {
  740. if (errno != EAGAIN) {
  741. msg_err_main("cannot read from worker's srv pipe: %s",
  742. strerror(errno));
  743. }
  744. else {
  745. return;
  746. }
  747. }
  748. else if (r == 0) {
  749. /*
  750. * Usually this means that a worker is dead, so do not try to read
  751. * anything
  752. */
  753. msg_err_main("cannot read from worker's srv pipe connection closed; command = %s",
  754. rspamd_srv_command_to_string(cmd.type));
  755. ev_io_stop(EV_A_ w);
  756. }
  757. else if (r != sizeof(cmd)) {
  758. msg_err_main("cannot read from worker's srv pipe incomplete command: %d != %d; command = %s",
  759. (gint) r, (gint) sizeof(cmd), rspamd_srv_command_to_string(cmd.type));
  760. }
  761. else {
  762. rdata = g_malloc0(sizeof(*rdata));
  763. rdata->worker = worker;
  764. rdata->srv = rspamd_main;
  765. rdata->rep.id = cmd.id;
  766. rdata->rep.type = cmd.type;
  767. rdata->fd = -1;
  768. worker->tmp_data = rdata;
  769. if (msg.msg_controllen >= CMSG_LEN(sizeof(int))) {
  770. rfd = *(int *) CMSG_DATA(CMSG_FIRSTHDR(&msg));
  771. }
  772. switch (cmd.type) {
  773. case RSPAMD_SRV_SOCKETPAIR:
  774. spair = g_hash_table_lookup(rspamd_main->spairs, cmd.cmd.spair.pair_id);
  775. if (spair == NULL) {
  776. spair = g_malloc(sizeof(gint) * 2);
  777. if (rspamd_socketpair(spair, cmd.cmd.spair.af) == -1) {
  778. rdata->rep.reply.spair.code = errno;
  779. msg_err_main("cannot create socket pair: %s", strerror(errno));
  780. }
  781. else {
  782. nid = g_malloc(sizeof(cmd.cmd.spair.pair_id));
  783. memcpy(nid, cmd.cmd.spair.pair_id,
  784. sizeof(cmd.cmd.spair.pair_id));
  785. g_hash_table_insert(rspamd_main->spairs, nid, spair);
  786. rdata->rep.reply.spair.code = 0;
  787. rdata->fd = cmd.cmd.spair.pair_num ? spair[1] : spair[0];
  788. }
  789. }
  790. else {
  791. rdata->rep.reply.spair.code = 0;
  792. rdata->fd = cmd.cmd.spair.pair_num ? spair[1] : spair[0];
  793. }
  794. break;
  795. case RSPAMD_SRV_HYPERSCAN_LOADED:
  796. /* Load RE cache to provide it for new forks */
  797. if (rspamd_re_cache_is_hs_loaded(rspamd_main->cfg->re_cache) != RSPAMD_HYPERSCAN_LOADED_FULL ||
  798. cmd.cmd.hs_loaded.forced) {
  799. rspamd_re_cache_load_hyperscan(
  800. rspamd_main->cfg->re_cache,
  801. cmd.cmd.hs_loaded.cache_dir,
  802. false);
  803. }
  804. /* After getting this notice, we can clean up old hyperscan files */
  805. rspamd_hyperscan_notice_loaded();
  806. msg_info_main("received hyperscan cache loaded from %s",
  807. cmd.cmd.hs_loaded.cache_dir);
  808. /* Broadcast command to all workers */
  809. memset(&wcmd, 0, sizeof(wcmd));
  810. wcmd.type = RSPAMD_CONTROL_HYPERSCAN_LOADED;
  811. rspamd_strlcpy(wcmd.cmd.hs_loaded.cache_dir,
  812. cmd.cmd.hs_loaded.cache_dir,
  813. sizeof(wcmd.cmd.hs_loaded.cache_dir));
  814. wcmd.cmd.hs_loaded.forced = cmd.cmd.hs_loaded.forced;
  815. rspamd_control_broadcast_cmd(rspamd_main, &wcmd, rfd,
  816. rspamd_control_ignore_io_handler, NULL, worker->pid);
  817. break;
  818. case RSPAMD_SRV_MONITORED_CHANGE:
  819. /* Broadcast command to all workers */
  820. memset(&wcmd, 0, sizeof(wcmd));
  821. wcmd.type = RSPAMD_CONTROL_MONITORED_CHANGE;
  822. rspamd_strlcpy(wcmd.cmd.monitored_change.tag,
  823. cmd.cmd.monitored_change.tag,
  824. sizeof(wcmd.cmd.monitored_change.tag));
  825. wcmd.cmd.monitored_change.alive = cmd.cmd.monitored_change.alive;
  826. wcmd.cmd.monitored_change.sender = cmd.cmd.monitored_change.sender;
  827. rspamd_control_broadcast_cmd(rspamd_main, &wcmd, rfd,
  828. rspamd_control_ignore_io_handler, NULL, 0);
  829. break;
  830. case RSPAMD_SRV_LOG_PIPE:
  831. memset(&wcmd, 0, sizeof(wcmd));
  832. wcmd.type = RSPAMD_CONTROL_LOG_PIPE;
  833. wcmd.cmd.log_pipe.type = cmd.cmd.log_pipe.type;
  834. rspamd_control_broadcast_cmd(rspamd_main, &wcmd, rfd,
  835. rspamd_control_log_pipe_io_handler, NULL, 0);
  836. break;
  837. case RSPAMD_SRV_ON_FORK:
  838. rdata->rep.reply.on_fork.status = 0;
  839. rspamd_control_handle_on_fork(&cmd, rspamd_main);
  840. break;
  841. case RSPAMD_SRV_HEARTBEAT:
  842. worker->hb.last_event = ev_time();
  843. rdata->rep.reply.heartbeat.status = 0;
  844. break;
  845. case RSPAMD_SRV_HEALTH:
  846. rspamd_fill_health_reply(rspamd_main, &rdata->rep);
  847. break;
  848. case RSPAMD_SRV_NOTICE_HYPERSCAN_CACHE:
  849. #ifdef WITH_HYPERSCAN
  850. rspamd_hyperscan_notice_known(cmd.cmd.hyperscan_cache_file.path);
  851. #endif
  852. rdata->rep.reply.hyperscan_cache_file.unused = 0;
  853. break;
  854. case RSPAMD_SRV_FUZZY_BLOCKED:
  855. /* Broadcast command to all workers */
  856. memset(&wcmd, 0, sizeof(wcmd));
  857. wcmd.type = RSPAMD_CONTROL_FUZZY_BLOCKED;
  858. /* Ensure that memcpy is safe */
  859. G_STATIC_ASSERT(sizeof(wcmd.cmd.fuzzy_blocked) == sizeof(cmd.cmd.fuzzy_blocked));
  860. memcpy(&wcmd.cmd.fuzzy_blocked, &cmd.cmd.fuzzy_blocked, sizeof(wcmd.cmd.fuzzy_blocked));
  861. rspamd_control_broadcast_cmd(rspamd_main, &wcmd, rfd,
  862. rspamd_control_ignore_io_handler, NULL, worker->pid);
  863. break;
  864. default:
  865. msg_err_main("unknown command type: %d", cmd.type);
  866. break;
  867. }
  868. if (rfd != -1) {
  869. /* Close our copy to avoid descriptors leak */
  870. close(rfd);
  871. }
  872. /* Now plan write event and send data back */
  873. w->data = rdata;
  874. ev_io_stop(EV_A_ w);
  875. ev_io_set(w, worker->srv_pipe[0], EV_WRITE);
  876. ev_io_start(EV_A_ w);
  877. }
  878. }
  879. else if (revents == EV_WRITE) {
  880. rdata = (struct rspamd_srv_reply_data *) w->data;
  881. worker = rdata->worker;
  882. worker->tmp_data = NULL; /* Avoid race */
  883. rspamd_main = rdata->srv;
  884. memset(&msg, 0, sizeof(msg));
  885. /* Attach fd to the message */
  886. if (rdata->fd != -1) {
  887. memset(fdspace, 0, sizeof(fdspace));
  888. msg.msg_control = fdspace;
  889. msg.msg_controllen = sizeof(fdspace);
  890. cmsg = CMSG_FIRSTHDR(&msg);
  891. cmsg->cmsg_level = SOL_SOCKET;
  892. cmsg->cmsg_type = SCM_RIGHTS;
  893. cmsg->cmsg_len = CMSG_LEN(sizeof(int));
  894. memcpy(CMSG_DATA(cmsg), &rdata->fd, sizeof(int));
  895. }
  896. iov.iov_base = &rdata->rep;
  897. iov.iov_len = sizeof(rdata->rep);
  898. msg.msg_iov = &iov;
  899. msg.msg_iovlen = 1;
  900. r = sendmsg(w->fd, &msg, 0);
  901. if (r == -1) {
  902. msg_err_main("cannot write to worker's srv pipe when writing reply: %s; command = %s",
  903. strerror(errno), rspamd_srv_command_to_string(rdata->rep.type));
  904. }
  905. else if (r != sizeof(rdata->rep)) {
  906. msg_err_main("cannot write to worker's srv pipe: %d != %d; command = %s",
  907. (int) r, (int) sizeof(rdata->rep),
  908. rspamd_srv_command_to_string(rdata->rep.type));
  909. }
  910. g_free(rdata);
  911. w->data = worker;
  912. ev_io_stop(EV_A_ w);
  913. ev_io_set(w, worker->srv_pipe[0], EV_READ);
  914. ev_io_start(EV_A_ w);
  915. }
  916. }
  917. void rspamd_srv_start_watching(struct rspamd_main *srv,
  918. struct rspamd_worker *worker,
  919. struct ev_loop *ev_base)
  920. {
  921. g_assert(worker != NULL);
  922. worker->tmp_data = NULL;
  923. worker->srv_ev.data = worker;
  924. ev_io_init(&worker->srv_ev, rspamd_srv_handler, worker->srv_pipe[0], EV_READ);
  925. ev_io_start(ev_base, &worker->srv_ev);
  926. }
  927. struct rspamd_srv_request_data {
  928. struct rspamd_worker *worker;
  929. struct rspamd_srv_command cmd;
  930. gint attached_fd;
  931. struct rspamd_srv_reply rep;
  932. rspamd_srv_reply_handler handler;
  933. ev_io io_ev;
  934. gpointer ud;
  935. };
  936. static void
  937. rspamd_srv_request_handler(EV_P_ ev_io *w, int revents)
  938. {
  939. struct rspamd_srv_request_data *rd = (struct rspamd_srv_request_data *) w->data;
  940. struct msghdr msg;
  941. struct iovec iov;
  942. guchar fdspace[CMSG_SPACE(sizeof(int))];
  943. struct cmsghdr *cmsg;
  944. gssize r;
  945. gint rfd = -1;
  946. if (revents == EV_WRITE) {
  947. /* Send request to server */
  948. memset(&msg, 0, sizeof(msg));
  949. /* Attach fd to the message */
  950. if (rd->attached_fd != -1) {
  951. memset(fdspace, 0, sizeof(fdspace));
  952. msg.msg_control = fdspace;
  953. msg.msg_controllen = sizeof(fdspace);
  954. cmsg = CMSG_FIRSTHDR(&msg);
  955. cmsg->cmsg_level = SOL_SOCKET;
  956. cmsg->cmsg_type = SCM_RIGHTS;
  957. cmsg->cmsg_len = CMSG_LEN(sizeof(int));
  958. memcpy(CMSG_DATA(cmsg), &rd->attached_fd, sizeof(int));
  959. }
  960. iov.iov_base = &rd->cmd;
  961. iov.iov_len = sizeof(rd->cmd);
  962. msg.msg_iov = &iov;
  963. msg.msg_iovlen = 1;
  964. r = sendmsg(w->fd, &msg, 0);
  965. if (r == -1) {
  966. if (r == ENOBUFS) {
  967. /* On BSD derived systems we can have this error when trying to send
  968. * requests too fast.
  969. * It might be good to retry...
  970. */
  971. msg_info("cannot write to server pipe: %s; command = %s; retrying sending",
  972. strerror(errno),
  973. rspamd_srv_command_to_string(rd->cmd.type));
  974. return;
  975. }
  976. msg_err("cannot write to server pipe: %s; command = %s", strerror(errno),
  977. rspamd_srv_command_to_string(rd->cmd.type));
  978. goto cleanup;
  979. }
  980. else if (r != sizeof(rd->cmd)) {
  981. msg_err("incomplete write to the server pipe: %d != %d, command = %s",
  982. (int) r, (int) sizeof(rd->cmd), rspamd_srv_command_to_string(rd->cmd.type));
  983. goto cleanup;
  984. }
  985. ev_io_stop(EV_A_ w);
  986. ev_io_set(w, rd->worker->srv_pipe[1], EV_READ);
  987. ev_io_start(EV_A_ w);
  988. }
  989. else {
  990. iov.iov_base = &rd->rep;
  991. iov.iov_len = sizeof(rd->rep);
  992. memset(&msg, 0, sizeof(msg));
  993. msg.msg_control = fdspace;
  994. msg.msg_controllen = sizeof(fdspace);
  995. msg.msg_iov = &iov;
  996. msg.msg_iovlen = 1;
  997. r = recvmsg(w->fd, &msg, 0);
  998. if (r == -1) {
  999. msg_err("cannot read from server pipe: %s; command = %s", strerror(errno),
  1000. rspamd_srv_command_to_string(rd->cmd.type));
  1001. goto cleanup;
  1002. }
  1003. if (r != (gint) sizeof(rd->rep)) {
  1004. msg_err("cannot read from server pipe, invalid length: %d != %d; command = %s",
  1005. (gint) r, (int) sizeof(rd->rep), rspamd_srv_command_to_string(rd->cmd.type));
  1006. goto cleanup;
  1007. }
  1008. if (msg.msg_controllen >= CMSG_LEN(sizeof(int))) {
  1009. rfd = *(int *) CMSG_DATA(CMSG_FIRSTHDR(&msg));
  1010. }
  1011. /* Reply has been received */
  1012. if (rd->handler) {
  1013. rd->handler(rd->worker, &rd->rep, rfd, rd->ud);
  1014. }
  1015. goto cleanup;
  1016. }
  1017. return;
  1018. cleanup:
  1019. ev_io_stop(EV_A_ w);
  1020. g_free(rd);
  1021. }
  1022. void rspamd_srv_send_command(struct rspamd_worker *worker,
  1023. struct ev_loop *ev_base,
  1024. struct rspamd_srv_command *cmd,
  1025. gint attached_fd,
  1026. rspamd_srv_reply_handler handler,
  1027. gpointer ud)
  1028. {
  1029. struct rspamd_srv_request_data *rd;
  1030. g_assert(cmd != NULL);
  1031. g_assert(worker != NULL);
  1032. rd = g_malloc0(sizeof(*rd));
  1033. cmd->id = ottery_rand_uint64();
  1034. memcpy(&rd->cmd, cmd, sizeof(rd->cmd));
  1035. rd->handler = handler;
  1036. rd->ud = ud;
  1037. rd->worker = worker;
  1038. rd->rep.id = cmd->id;
  1039. rd->rep.type = cmd->type;
  1040. rd->attached_fd = attached_fd;
  1041. rd->io_ev.data = rd;
  1042. ev_io_init(&rd->io_ev, rspamd_srv_request_handler,
  1043. rd->worker->srv_pipe[1], EV_WRITE);
  1044. ev_io_start(ev_base, &rd->io_ev);
  1045. }
  1046. enum rspamd_control_type
  1047. rspamd_control_command_from_string(const gchar *str)
  1048. {
  1049. enum rspamd_control_type ret = RSPAMD_CONTROL_MAX;
  1050. if (!str) {
  1051. return ret;
  1052. }
  1053. if (g_ascii_strcasecmp(str, "hyperscan_loaded") == 0) {
  1054. ret = RSPAMD_CONTROL_HYPERSCAN_LOADED;
  1055. }
  1056. else if (g_ascii_strcasecmp(str, "stat") == 0) {
  1057. ret = RSPAMD_CONTROL_STAT;
  1058. }
  1059. else if (g_ascii_strcasecmp(str, "reload") == 0) {
  1060. ret = RSPAMD_CONTROL_RELOAD;
  1061. }
  1062. else if (g_ascii_strcasecmp(str, "reresolve") == 0) {
  1063. ret = RSPAMD_CONTROL_RERESOLVE;
  1064. }
  1065. else if (g_ascii_strcasecmp(str, "recompile") == 0) {
  1066. ret = RSPAMD_CONTROL_RECOMPILE;
  1067. }
  1068. else if (g_ascii_strcasecmp(str, "log_pipe") == 0) {
  1069. ret = RSPAMD_CONTROL_LOG_PIPE;
  1070. }
  1071. else if (g_ascii_strcasecmp(str, "fuzzy_stat") == 0) {
  1072. ret = RSPAMD_CONTROL_FUZZY_STAT;
  1073. }
  1074. else if (g_ascii_strcasecmp(str, "fuzzy_sync") == 0) {
  1075. ret = RSPAMD_CONTROL_FUZZY_SYNC;
  1076. }
  1077. else if (g_ascii_strcasecmp(str, "monitored_change") == 0) {
  1078. ret = RSPAMD_CONTROL_MONITORED_CHANGE;
  1079. }
  1080. else if (g_ascii_strcasecmp(str, "child_change") == 0) {
  1081. ret = RSPAMD_CONTROL_CHILD_CHANGE;
  1082. }
  1083. return ret;
  1084. }
  1085. const gchar *
  1086. rspamd_control_command_to_string(enum rspamd_control_type cmd)
  1087. {
  1088. const gchar *reply = "unknown";
  1089. switch (cmd) {
  1090. case RSPAMD_CONTROL_STAT:
  1091. reply = "stat";
  1092. break;
  1093. case RSPAMD_CONTROL_RELOAD:
  1094. reply = "reload";
  1095. break;
  1096. case RSPAMD_CONTROL_RERESOLVE:
  1097. reply = "reresolve";
  1098. break;
  1099. case RSPAMD_CONTROL_RECOMPILE:
  1100. reply = "recompile";
  1101. break;
  1102. case RSPAMD_CONTROL_HYPERSCAN_LOADED:
  1103. reply = "hyperscan_loaded";
  1104. break;
  1105. case RSPAMD_CONTROL_LOG_PIPE:
  1106. reply = "log_pipe";
  1107. break;
  1108. case RSPAMD_CONTROL_FUZZY_STAT:
  1109. reply = "fuzzy_stat";
  1110. break;
  1111. case RSPAMD_CONTROL_FUZZY_SYNC:
  1112. reply = "fuzzy_sync";
  1113. break;
  1114. case RSPAMD_CONTROL_MONITORED_CHANGE:
  1115. reply = "monitored_change";
  1116. break;
  1117. case RSPAMD_CONTROL_CHILD_CHANGE:
  1118. reply = "child_change";
  1119. break;
  1120. default:
  1121. break;
  1122. }
  1123. return reply;
  1124. }
  1125. const gchar *rspamd_srv_command_to_string(enum rspamd_srv_type cmd)
  1126. {
  1127. const gchar *reply = "unknown";
  1128. switch (cmd) {
  1129. case RSPAMD_SRV_SOCKETPAIR:
  1130. reply = "socketpair";
  1131. break;
  1132. case RSPAMD_SRV_HYPERSCAN_LOADED:
  1133. reply = "hyperscan_loaded";
  1134. break;
  1135. case RSPAMD_SRV_MONITORED_CHANGE:
  1136. reply = "monitored_change";
  1137. break;
  1138. case RSPAMD_SRV_LOG_PIPE:
  1139. reply = "log_pipe";
  1140. break;
  1141. case RSPAMD_SRV_ON_FORK:
  1142. reply = "on_fork";
  1143. break;
  1144. case RSPAMD_SRV_HEARTBEAT:
  1145. reply = "heartbeat";
  1146. break;
  1147. case RSPAMD_SRV_HEALTH:
  1148. reply = "health";
  1149. break;
  1150. case RSPAMD_SRV_NOTICE_HYPERSCAN_CACHE:
  1151. reply = "notice_hyperscan_cache";
  1152. break;
  1153. case RSPAMD_SRV_FUZZY_BLOCKED:
  1154. reply = "fuzzy_blocked";
  1155. break;
  1156. }
  1157. return reply;
  1158. }