You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd_proxy.c 57KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "libutil/util.h"
  18. #include "libutil/map.h"
  19. #include "libutil/upstream.h"
  20. #include "libutil/http.h"
  21. #include "libutil/http_private.h"
  22. #include "libserver/protocol.h"
  23. #include "libserver/protocol_internal.h"
  24. #include "libserver/cfg_file.h"
  25. #include "libserver/url.h"
  26. #include "libserver/dns.h"
  27. #include "libmime/message.h"
  28. #include "rspamd.h"
  29. #include "libserver/worker_util.h"
  30. #include "worker_private.h"
  31. #include "lua/lua_common.h"
  32. #include "keypairs_cache.h"
  33. #include "libstat/stat_api.h"
  34. #include "ottery.h"
  35. #include "unix-std.h"
  36. #include "libserver/milter.h"
  37. #include "libserver/milter_internal.h"
  38. #include "libmime/lang_detection.h"
  39. #include "contrib/zstd/zstd.h"
  40. #include <math.h>
  41. #ifdef HAVE_NETINET_TCP_H
  42. #include <netinet/tcp.h> /* for TCP_NODELAY */
  43. #endif
  44. /* Rotate keys each minute by default */
  45. #define DEFAULT_ROTATION_TIME 60.0
  46. #define DEFAULT_RETRIES 5
  47. #define msg_err_session(...) rspamd_default_log_function (G_LOG_LEVEL_CRITICAL, \
  48. session->pool->tag.tagname, session->pool->tag.uid, \
  49. G_STRFUNC, \
  50. __VA_ARGS__)
  51. #define msg_warn_session(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  52. session->pool->tag.tagname, session->pool->tag.uid, \
  53. G_STRFUNC, \
  54. __VA_ARGS__)
  55. #define msg_info_session(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  56. session->pool->tag.tagname, session->pool->tag.uid, \
  57. G_STRFUNC, \
  58. __VA_ARGS__)
  59. #define msg_debug_session(...) rspamd_conditional_debug_fast (NULL, session->client_addr, \
  60. rspamd_proxy_log_id, "proxy", session->pool->tag.uid, \
  61. G_STRFUNC, \
  62. __VA_ARGS__)
  63. INIT_LOG_MODULE(proxy)
  64. gpointer init_rspamd_proxy (struct rspamd_config *cfg);
  65. void start_rspamd_proxy (struct rspamd_worker *worker);
  66. worker_t rspamd_proxy_worker = {
  67. "rspamd_proxy", /* Name */
  68. init_rspamd_proxy, /* Init function */
  69. start_rspamd_proxy, /* Start function */
  70. RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE | RSPAMD_WORKER_SCANNER,
  71. RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */
  72. RSPAMD_WORKER_VER
  73. };
  74. struct rspamd_http_upstream {
  75. gchar *name;
  76. gchar *settings_id;
  77. struct upstream_list *u;
  78. struct rspamd_cryptobox_pubkey *key;
  79. gdouble timeout;
  80. struct timeval io_tv;
  81. gint parser_from_ref;
  82. gint parser_to_ref;
  83. gboolean local;
  84. gboolean self_scan;
  85. gboolean compress;
  86. };
  87. struct rspamd_http_mirror {
  88. gchar *name;
  89. gchar *settings_id;
  90. struct upstream_list *u;
  91. struct rspamd_cryptobox_pubkey *key;
  92. gdouble prob;
  93. gdouble timeout;
  94. struct timeval io_tv;
  95. gint parser_from_ref;
  96. gint parser_to_ref;
  97. gboolean local;
  98. gboolean compress;
  99. };
  100. static const guint64 rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL;
  101. struct rspamd_proxy_ctx {
  102. guint64 magic;
  103. /* Events base */
  104. struct event_base *ev_base;
  105. /* DNS resolver */
  106. struct rspamd_dns_resolver *resolver;
  107. /* Config */
  108. struct rspamd_config *cfg;
  109. /* END OF COMMON PART */
  110. gdouble timeout;
  111. struct timeval io_tv;
  112. /* Encryption key for clients */
  113. struct rspamd_cryptobox_keypair *key;
  114. /* Keys cache */
  115. struct rspamd_keypair_cache *keys_cache;
  116. /* Upstreams to use */
  117. GHashTable *upstreams;
  118. /* Mirrors to send traffic to */
  119. GPtrArray *mirrors;
  120. /* Default upstream */
  121. struct rspamd_http_upstream *default_upstream;
  122. /* Local rotating keypair for upstreams */
  123. struct rspamd_cryptobox_keypair *local_key;
  124. struct event rotate_ev;
  125. gdouble rotate_tm;
  126. lua_State *lua_state;
  127. /* Array of callback functions called on end of scan to compare results */
  128. GArray *cmp_refs;
  129. /* Maximum count for retries */
  130. guint max_retries;
  131. /* If we have self_scanning backends, we need to work as a normal worker */
  132. gboolean has_self_scan;
  133. /* It is not HTTP but milter proxy */
  134. gboolean milter;
  135. /* Discard messages instead of rejecting them */
  136. gboolean discard_on_reject;
  137. /* Quarantine messages instead of rejecting them */
  138. gboolean quarantine_on_reject;
  139. /* Milter spam header */
  140. gchar *spam_header;
  141. /* CA name that can be used for client certificates */
  142. gchar *client_ca_name;
  143. /* Milter rejection message */
  144. gchar *reject_message;
  145. /* Sessions cache */
  146. void *sessions_cache;
  147. struct rspamd_milter_context milter_ctx;
  148. /* Language detector */
  149. struct rspamd_lang_detector *lang_det;
  150. };
  151. enum rspamd_backend_flags {
  152. RSPAMD_BACKEND_REPLIED = 1 << 0,
  153. RSPAMD_BACKEND_CLOSED = 1 << 1,
  154. RSPAMD_BACKEND_PARSED = 1 << 2,
  155. };
  156. struct rspamd_proxy_session;
  157. struct rspamd_proxy_backend_connection {
  158. const gchar *name;
  159. struct rspamd_cryptobox_keypair *local_key;
  160. struct rspamd_cryptobox_pubkey *remote_key;
  161. struct upstream *up;
  162. struct rspamd_http_connection *backend_conn;
  163. ucl_object_t *results;
  164. const gchar *err;
  165. struct rspamd_proxy_session *s;
  166. struct timeval *io_tv;
  167. gint backend_sock;
  168. enum rspamd_backend_flags flags;
  169. gint parser_from_ref;
  170. gint parser_to_ref;
  171. struct rspamd_task *task;
  172. };
  173. enum rspamd_proxy_legacy_support {
  174. LEGACY_SUPPORT_NO = 0,
  175. LEGACY_SUPPORT_RSPAMC,
  176. LEGACY_SUPPORT_SPAMC
  177. };
  178. struct rspamd_proxy_session {
  179. struct rspamd_worker *worker;
  180. rspamd_mempool_t *pool;
  181. struct rspamd_proxy_ctx *ctx;
  182. rspamd_inet_addr_t *client_addr;
  183. struct rspamd_http_connection *client_conn;
  184. struct rspamd_milter_session *client_milter_conn;
  185. struct rspamd_http_upstream *backend;
  186. gpointer map;
  187. gchar *fname;
  188. gpointer shmem_ref;
  189. struct rspamd_proxy_backend_connection *master_conn;
  190. struct rspamd_http_message *client_message;
  191. GPtrArray *mirror_conns;
  192. gsize map_len;
  193. gint client_sock;
  194. enum rspamd_proxy_legacy_support legacy_support;
  195. gint retries;
  196. ref_entry_t ref;
  197. };
  198. static gboolean proxy_send_master_message (struct rspamd_proxy_session *session);
  199. static GQuark
  200. rspamd_proxy_quark (void)
  201. {
  202. return g_quark_from_static_string ("rspamd-proxy");
  203. }
  204. static gboolean
  205. rspamd_proxy_parse_lua_parser (lua_State *L, const ucl_object_t *obj,
  206. gint *ref_from, gint *ref_to, GError **err)
  207. {
  208. const gchar *lua_script;
  209. gsize slen;
  210. gint err_idx, ref_idx;
  211. GString *tb = NULL;
  212. gboolean has_ref = FALSE;
  213. g_assert (obj != NULL);
  214. g_assert (ref_from != NULL);
  215. g_assert (ref_to != NULL);
  216. *ref_from = -1;
  217. *ref_to = -1;
  218. lua_script = ucl_object_tolstring (obj, &slen);
  219. lua_pushcfunction (L, &rspamd_lua_traceback);
  220. err_idx = lua_gettop (L);
  221. /* Load data */
  222. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  223. g_set_error (err,
  224. rspamd_proxy_quark (),
  225. EINVAL,
  226. "cannot load lua parser script: %s",
  227. lua_tostring (L, -1));
  228. lua_settop (L, 0); /* Error function */
  229. return FALSE;
  230. }
  231. /* Now do it */
  232. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  233. tb = lua_touserdata (L, -1);
  234. g_set_error (err,
  235. rspamd_proxy_quark (),
  236. EINVAL,
  237. "cannot init lua parser script: %s",
  238. tb->str);
  239. g_string_free (tb, TRUE);
  240. lua_settop (L, 0);
  241. return FALSE;
  242. }
  243. if (lua_istable (L, -1)) {
  244. /*
  245. * We have a table, so we check for two keys:
  246. * 'from' -> function
  247. * 'to' -> function
  248. *
  249. * From converts parent request to a client one
  250. * To converts client request to a parent one
  251. */
  252. lua_pushstring (L, "from");
  253. lua_gettable (L, -2);
  254. if (lua_isfunction (L, -1)) {
  255. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  256. *ref_from = ref_idx;
  257. has_ref = TRUE;
  258. }
  259. lua_pushstring (L, "to");
  260. lua_gettable (L, -2);
  261. if (lua_isfunction (L, -1)) {
  262. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  263. *ref_to = ref_idx;
  264. has_ref = TRUE;
  265. }
  266. }
  267. else if (!lua_isfunction (L, -1)) {
  268. g_set_error (err,
  269. rspamd_proxy_quark (),
  270. EINVAL,
  271. "cannot init lua parser script: "
  272. "must return function");
  273. lua_settop (L, 0);
  274. return FALSE;
  275. }
  276. else {
  277. /* Just parser from protocol */
  278. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  279. *ref_from = ref_idx;
  280. lua_settop (L, 0);
  281. has_ref = TRUE;
  282. }
  283. return has_ref;
  284. }
  285. static gboolean
  286. rspamd_proxy_parse_upstream (rspamd_mempool_t *pool,
  287. const ucl_object_t *obj,
  288. gpointer ud,
  289. struct rspamd_rcl_section *section,
  290. GError **err)
  291. {
  292. const ucl_object_t *elt;
  293. struct rspamd_http_upstream *up = NULL;
  294. struct rspamd_proxy_ctx *ctx;
  295. struct rspamd_rcl_struct_parser *pd = ud;
  296. lua_State *L;
  297. ctx = pd->user_struct;
  298. L = ctx->lua_state;
  299. if (ucl_object_type (obj) != UCL_OBJECT) {
  300. g_set_error (err, rspamd_proxy_quark (), 100,
  301. "upstream option must be an object");
  302. return FALSE;
  303. }
  304. up = rspamd_mempool_alloc0 (pool, sizeof (*up));
  305. elt = ucl_object_lookup (obj, "name");
  306. if (elt == NULL) {
  307. if (ucl_object_key (obj)) {
  308. if (strcmp (ucl_object_key (obj), "upstream") == 0) {
  309. /* Iterate over the object and find upstream elements */
  310. ucl_object_iter_t it = NULL;
  311. const ucl_object_t *cur;
  312. gboolean ret = TRUE;
  313. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  314. if (!rspamd_proxy_parse_upstream (pool, cur, ud,
  315. section, err)) {
  316. ret = FALSE;
  317. }
  318. }
  319. return ret;
  320. }
  321. else {
  322. /* Inside upstream */
  323. up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
  324. }
  325. }
  326. else {
  327. g_set_error (err, rspamd_proxy_quark (), 100,
  328. "upstream option must have some name definition");
  329. return FALSE;
  330. }
  331. }
  332. else {
  333. up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  334. }
  335. up->parser_from_ref = -1;
  336. up->parser_to_ref = -1;
  337. up->timeout = ctx->timeout;
  338. elt = ucl_object_lookup (obj, "key");
  339. if (elt != NULL) {
  340. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  341. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  342. if (up->key == NULL) {
  343. g_set_error (err, rspamd_proxy_quark (), 100,
  344. "cannot read upstream key");
  345. goto err;
  346. }
  347. rspamd_mempool_add_destructor (pool,
  348. (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
  349. }
  350. elt = ucl_object_lookup (obj, "self_scan");
  351. if (elt && ucl_object_toboolean (elt)) {
  352. up->self_scan = TRUE;
  353. ctx->has_self_scan = TRUE;
  354. }
  355. elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
  356. if (elt && ucl_object_toboolean (elt)) {
  357. up->compress = TRUE;
  358. }
  359. elt = ucl_object_lookup (obj, "hosts");
  360. if (elt == NULL && !up->self_scan) {
  361. g_set_error (err, rspamd_proxy_quark (), 100,
  362. "upstream option must have some hosts definition");
  363. goto err;
  364. }
  365. if (elt) {
  366. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  367. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  368. g_set_error (err, rspamd_proxy_quark (), 100,
  369. "upstream has bad hosts definition");
  370. goto err;
  371. }
  372. rspamd_mempool_add_destructor (pool,
  373. (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
  374. }
  375. elt = ucl_object_lookup (obj, "default");
  376. if (elt) {
  377. if (ucl_object_toboolean (elt)) {
  378. ctx->default_upstream = up;
  379. }
  380. }
  381. else if (up->self_scan) {
  382. ctx->default_upstream = up;
  383. }
  384. elt = ucl_object_lookup (obj, "local");
  385. if (elt && ucl_object_toboolean (elt)) {
  386. up->local = TRUE;
  387. }
  388. elt = ucl_object_lookup (obj, "timeout");
  389. if (elt) {
  390. ucl_object_todouble_safe (elt, &up->timeout);
  391. }
  392. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  393. if (elt && ucl_object_type (elt) == UCL_STRING) {
  394. up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  395. }
  396. /*
  397. * Accept lua function here in form
  398. * fun :: String -> UCL
  399. */
  400. elt = ucl_object_lookup (obj, "parser");
  401. if (elt) {
  402. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  403. &up->parser_to_ref, err)) {
  404. goto err;
  405. }
  406. rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
  407. rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
  408. }
  409. double_to_tv (up->timeout, &up->io_tv);
  410. g_hash_table_insert (ctx->upstreams, up->name, up);
  411. return TRUE;
  412. err:
  413. return FALSE;
  414. }
  415. static gboolean
  416. rspamd_proxy_parse_mirror (rspamd_mempool_t *pool,
  417. const ucl_object_t *obj,
  418. gpointer ud,
  419. struct rspamd_rcl_section *section,
  420. GError **err)
  421. {
  422. const ucl_object_t *elt;
  423. struct rspamd_http_mirror *up = NULL;
  424. struct rspamd_proxy_ctx *ctx;
  425. struct rspamd_rcl_struct_parser *pd = ud;
  426. lua_State *L;
  427. ctx = pd->user_struct;
  428. L = ctx->lua_state;
  429. if (ucl_object_type (obj) != UCL_OBJECT) {
  430. g_set_error (err, rspamd_proxy_quark (), 100,
  431. "mirror option must be an object");
  432. return FALSE;
  433. }
  434. up = rspamd_mempool_alloc0 (pool, sizeof (*up));
  435. elt = ucl_object_lookup (obj, "name");
  436. if (elt == NULL) {
  437. if (ucl_object_key (obj)) {
  438. if (strcmp (ucl_object_key (obj), "mirror") == 0) {
  439. /* Iterate over the object and find upstream elements */
  440. ucl_object_iter_t it = NULL;
  441. const ucl_object_t *cur;
  442. gboolean ret = TRUE;
  443. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  444. if (!rspamd_proxy_parse_mirror (pool, cur, ud,
  445. section, err)) {
  446. ret = FALSE;
  447. }
  448. }
  449. return ret;
  450. }
  451. else {
  452. /* Inside upstream */
  453. up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
  454. }
  455. }
  456. else {
  457. g_set_error (err, rspamd_proxy_quark (), 100,
  458. "mirror option must have some name definition");
  459. return FALSE;
  460. }
  461. }
  462. else {
  463. up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  464. }
  465. up->parser_to_ref = -1;
  466. up->parser_from_ref = -1;
  467. up->timeout = ctx->timeout;
  468. elt = ucl_object_lookup (obj, "key");
  469. if (elt != NULL) {
  470. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  471. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  472. if (up->key == NULL) {
  473. g_set_error (err, rspamd_proxy_quark (), 100,
  474. "cannot read mirror key");
  475. goto err;
  476. }
  477. rspamd_mempool_add_destructor (pool,
  478. (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
  479. }
  480. elt = ucl_object_lookup (obj, "hosts");
  481. if (elt == NULL) {
  482. g_set_error (err, rspamd_proxy_quark (), 100,
  483. "mirror option must have some hosts definition");
  484. goto err;
  485. }
  486. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  487. if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
  488. g_set_error (err, rspamd_proxy_quark (), 100,
  489. "mirror has bad hosts definition");
  490. goto err;
  491. }
  492. rspamd_mempool_add_destructor (pool,
  493. (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
  494. elt = ucl_object_lookup_any (obj, "probability", "prob", NULL);
  495. if (elt) {
  496. up->prob = ucl_object_todouble (elt);
  497. }
  498. else {
  499. up->prob = 1.0;
  500. }
  501. elt = ucl_object_lookup (obj, "local");
  502. if (elt && ucl_object_toboolean (elt)) {
  503. up->local = TRUE;
  504. }
  505. elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
  506. if (elt && ucl_object_toboolean (elt)) {
  507. up->compress = TRUE;
  508. }
  509. elt = ucl_object_lookup (obj, "timeout");
  510. if (elt) {
  511. ucl_object_todouble_safe (elt, &up->timeout);
  512. }
  513. /*
  514. * Accept lua function here in form
  515. * fun :: String -> UCL
  516. */
  517. elt = ucl_object_lookup (obj, "parser");
  518. if (elt) {
  519. if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
  520. &up->parser_to_ref, err)) {
  521. goto err;
  522. }
  523. rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
  524. rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
  525. }
  526. elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
  527. if (elt && ucl_object_type (elt) == UCL_STRING) {
  528. up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
  529. }
  530. double_to_tv (up->timeout, &up->io_tv);
  531. g_ptr_array_add (ctx->mirrors, up);
  532. return TRUE;
  533. err:
  534. return FALSE;
  535. }
  536. static gboolean
  537. rspamd_proxy_parse_script (rspamd_mempool_t *pool,
  538. const ucl_object_t *obj,
  539. gpointer ud,
  540. struct rspamd_rcl_section *section,
  541. GError **err)
  542. {
  543. struct rspamd_proxy_ctx *ctx;
  544. struct rspamd_rcl_struct_parser *pd = ud;
  545. lua_State *L;
  546. const gchar *lua_script;
  547. gsize slen;
  548. gint err_idx, ref_idx;
  549. GString *tb = NULL;
  550. struct stat st;
  551. ctx = pd->user_struct;
  552. L = ctx->lua_state;
  553. if (ucl_object_type (obj) != UCL_STRING) {
  554. g_set_error (err, rspamd_proxy_quark (), 100,
  555. "script option must be a string with file or lua chunk");
  556. return FALSE;
  557. }
  558. lua_script = ucl_object_tolstring (obj, &slen);
  559. lua_pushcfunction (L, &rspamd_lua_traceback);
  560. err_idx = lua_gettop (L);
  561. if (stat (lua_script, &st) != -1) {
  562. /* Load file */
  563. if (luaL_loadfile (L, lua_script) != 0) {
  564. g_set_error (err,
  565. rspamd_proxy_quark (),
  566. EINVAL,
  567. "cannot load lua parser script: %s",
  568. lua_tostring (L, -1));
  569. lua_settop (L, 0); /* Error function */
  570. goto err;
  571. }
  572. }
  573. else {
  574. /* Load data directly */
  575. if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
  576. g_set_error (err,
  577. rspamd_proxy_quark (),
  578. EINVAL,
  579. "cannot load lua parser script: %s",
  580. lua_tostring (L, -1));
  581. lua_settop (L, 0); /* Error function */
  582. goto err;
  583. }
  584. }
  585. /* Now do it */
  586. if (lua_pcall (L, 0, 1, err_idx) != 0) {
  587. tb = lua_touserdata (L, -1);
  588. g_set_error (err,
  589. rspamd_proxy_quark (),
  590. EINVAL,
  591. "cannot init lua parser script: %s",
  592. tb->str);
  593. g_string_free (tb, TRUE);
  594. lua_settop (L, 0);
  595. goto err;
  596. }
  597. if (!lua_isfunction (L, -1)) {
  598. g_set_error (err,
  599. rspamd_proxy_quark (),
  600. EINVAL,
  601. "cannot init lua parser script: "
  602. "must return function, %s returned",
  603. lua_typename (L, lua_type (L, -1)));
  604. lua_settop (L, 0);
  605. goto err;
  606. }
  607. ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
  608. lua_settop (L, 0);
  609. g_array_append_val (ctx->cmp_refs, ref_idx);
  610. return TRUE;
  611. err:
  612. return FALSE;
  613. }
  614. gpointer
  615. init_rspamd_proxy (struct rspamd_config *cfg)
  616. {
  617. struct rspamd_proxy_ctx *ctx;
  618. GQuark type;
  619. type = g_quark_try_string ("rspamd_proxy");
  620. ctx = rspamd_mempool_alloc0 (cfg->cfg_pool,
  621. sizeof (struct rspamd_proxy_ctx));
  622. ctx->magic = rspamd_rspamd_proxy_magic;
  623. ctx->timeout = 120.0;
  624. ctx->upstreams = g_hash_table_new (rspamd_strcase_hash, rspamd_strcase_equal);
  625. rspamd_mempool_add_destructor (cfg->cfg_pool,
  626. (rspamd_mempool_destruct_t)g_hash_table_unref, ctx->upstreams);
  627. ctx->mirrors = g_ptr_array_new ();
  628. rspamd_mempool_add_destructor (cfg->cfg_pool,
  629. (rspamd_mempool_destruct_t)rspamd_ptr_array_free_hard, ctx->mirrors);
  630. ctx->rotate_tm = DEFAULT_ROTATION_TIME;
  631. ctx->cfg = cfg;
  632. ctx->lua_state = cfg->lua_state;
  633. ctx->cmp_refs = g_array_new (FALSE, FALSE, sizeof (gint));
  634. rspamd_mempool_add_destructor (cfg->cfg_pool,
  635. (rspamd_mempool_destruct_t)rspamd_array_free_hard, ctx->cmp_refs);
  636. ctx->max_retries = DEFAULT_RETRIES;
  637. ctx->spam_header = RSPAMD_MILTER_SPAM_HEADER;
  638. rspamd_rcl_register_worker_option (cfg,
  639. type,
  640. "timeout",
  641. rspamd_rcl_parse_struct_time,
  642. ctx,
  643. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, timeout),
  644. RSPAMD_CL_FLAG_TIME_FLOAT,
  645. "IO timeout");
  646. rspamd_rcl_register_worker_option (cfg,
  647. type,
  648. "rotate",
  649. rspamd_rcl_parse_struct_time,
  650. ctx,
  651. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, rotate_tm),
  652. RSPAMD_CL_FLAG_TIME_FLOAT,
  653. "Rotation keys time, default: "
  654. G_STRINGIFY (DEFAULT_ROTATION_TIME) " seconds");
  655. rspamd_rcl_register_worker_option (cfg,
  656. type,
  657. "keypair",
  658. rspamd_rcl_parse_struct_keypair,
  659. ctx,
  660. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, key),
  661. 0,
  662. "Server's keypair");
  663. rspamd_rcl_register_worker_option (cfg,
  664. type,
  665. "upstream",
  666. rspamd_proxy_parse_upstream,
  667. ctx,
  668. 0,
  669. 0,
  670. "List of upstreams");
  671. rspamd_rcl_register_worker_option (cfg,
  672. type,
  673. "mirror",
  674. rspamd_proxy_parse_mirror,
  675. ctx,
  676. 0,
  677. RSPAMD_CL_FLAG_MULTIPLE,
  678. "List of mirrors");
  679. rspamd_rcl_register_worker_option (cfg,
  680. type,
  681. "script",
  682. rspamd_proxy_parse_script,
  683. ctx,
  684. 0,
  685. RSPAMD_CL_FLAG_MULTIPLE,
  686. "Compare script to be executed");
  687. rspamd_rcl_register_worker_option (cfg,
  688. type,
  689. "max_retries",
  690. rspamd_rcl_parse_struct_integer,
  691. ctx,
  692. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, max_retries),
  693. RSPAMD_CL_FLAG_UINT,
  694. "Maximum number of retries for master connection");
  695. rspamd_rcl_register_worker_option (cfg,
  696. type,
  697. "milter",
  698. rspamd_rcl_parse_struct_boolean,
  699. ctx,
  700. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, milter),
  701. 0,
  702. "Accept milter connections, not HTTP");
  703. rspamd_rcl_register_worker_option (cfg,
  704. type,
  705. "discard_on_reject",
  706. rspamd_rcl_parse_struct_boolean,
  707. ctx,
  708. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, discard_on_reject),
  709. 0,
  710. "Tell MTA to discard rejected messages silently");
  711. rspamd_rcl_register_worker_option (cfg,
  712. type,
  713. "quarantine_on_reject",
  714. rspamd_rcl_parse_struct_boolean,
  715. ctx,
  716. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, quarantine_on_reject),
  717. 0,
  718. "Tell MTA to quarantine rejected messages");
  719. rspamd_rcl_register_worker_option (cfg,
  720. type,
  721. "spam_header",
  722. rspamd_rcl_parse_struct_string,
  723. ctx,
  724. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, spam_header),
  725. 0,
  726. "Use the specific spam header (default: X-Spam)");
  727. rspamd_rcl_register_worker_option (cfg,
  728. type,
  729. "client_ca_name",
  730. rspamd_rcl_parse_struct_string,
  731. ctx,
  732. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, client_ca_name),
  733. 0,
  734. "Allow certificates issued by this CA to be treated as client certificates");
  735. rspamd_rcl_register_worker_option (cfg,
  736. type,
  737. "reject_message",
  738. rspamd_rcl_parse_struct_string,
  739. ctx,
  740. G_STRUCT_OFFSET (struct rspamd_proxy_ctx, reject_message),
  741. 0,
  742. "Use custom rejection message");
  743. return ctx;
  744. }
  745. static void
  746. proxy_backend_close_connection (struct rspamd_proxy_backend_connection *conn)
  747. {
  748. if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  749. if (conn->backend_conn) {
  750. rspamd_http_connection_reset (conn->backend_conn);
  751. rspamd_http_connection_unref (conn->backend_conn);
  752. close (conn->backend_sock);
  753. }
  754. conn->flags |= RSPAMD_BACKEND_CLOSED;
  755. }
  756. }
  757. static gboolean
  758. proxy_backend_parse_results (struct rspamd_proxy_session *session,
  759. struct rspamd_proxy_backend_connection *conn,
  760. lua_State *L, gint parser_ref,
  761. const gchar *in, gsize inlen)
  762. {
  763. struct ucl_parser *parser;
  764. GString *tb = NULL;
  765. gint err_idx;
  766. if (inlen == 0 || in == NULL) {
  767. return FALSE;
  768. }
  769. if (parser_ref != -1) {
  770. /* Call parser function */
  771. lua_pushcfunction (L, &rspamd_lua_traceback);
  772. err_idx = lua_gettop (L);
  773. lua_rawgeti (L, LUA_REGISTRYINDEX, parser_ref);
  774. /* XXX: copies all data */
  775. lua_pushlstring (L, in, inlen);
  776. if (lua_pcall (L, 1, 1, err_idx) != 0) {
  777. tb = lua_touserdata (L, -1);
  778. msg_err_session (
  779. "cannot run lua parser script: %s",
  780. tb->str);
  781. g_string_free (tb, TRUE);
  782. lua_settop (L, 0);
  783. return FALSE;
  784. }
  785. conn->results = ucl_object_lua_import (L, -1);
  786. lua_settop (L, 0);
  787. }
  788. else {
  789. parser = ucl_parser_new (0);
  790. if (!ucl_parser_add_chunk (parser, in, inlen)) {
  791. gchar *encoded;
  792. encoded = rspamd_encode_base64 (in, inlen, 0, NULL);
  793. msg_err_session ("cannot parse input: %s", ucl_parser_get_error (
  794. parser));
  795. msg_err_session ("input encoded: %s", encoded);
  796. ucl_parser_free (parser);
  797. g_free (encoded);
  798. return FALSE;
  799. }
  800. conn->results = ucl_parser_get_object (parser);
  801. ucl_parser_free (parser);
  802. }
  803. return TRUE;
  804. }
  805. static void
  806. proxy_call_cmp_script (struct rspamd_proxy_session *session, gint cbref)
  807. {
  808. GString *tb = NULL;
  809. gint err_idx;
  810. guint i;
  811. struct rspamd_proxy_backend_connection *conn;
  812. lua_State *L;
  813. L = session->ctx->lua_state;
  814. lua_pushcfunction (L, &rspamd_lua_traceback);
  815. err_idx = lua_gettop (L);
  816. lua_rawgeti (L, LUA_REGISTRYINDEX, cbref);
  817. lua_createtable (L, 0, session->mirror_conns->len + 1);
  818. /* Now push master results */
  819. if (session->master_conn && session->master_conn->results) {
  820. lua_pushstring (L, "master");
  821. ucl_object_push_lua (L, session->master_conn->results, true);
  822. lua_settable (L, -3);
  823. }
  824. else {
  825. lua_pushstring (L, "master");
  826. lua_pushstring (L, "no results");
  827. lua_settable (L, -3);
  828. }
  829. for (i = 0; i < session->mirror_conns->len; i ++) {
  830. conn = g_ptr_array_index (session->mirror_conns, i);
  831. if (conn->results) {
  832. lua_pushstring (L, conn->name);
  833. ucl_object_push_lua (L, conn->results, true);
  834. lua_settable (L, -3);
  835. }
  836. else {
  837. lua_pushstring (L, conn->name);
  838. lua_pushstring (L, conn->err ? conn->err : "unknown error");
  839. lua_settable (L, -3);
  840. }
  841. }
  842. if (lua_pcall (L, 1, 0, err_idx) != 0) {
  843. tb = lua_touserdata (L, -1);
  844. msg_err_session (
  845. "cannot run lua compare script: %s",
  846. tb->str);
  847. g_string_free (tb, TRUE);
  848. }
  849. lua_settop (L, 0);
  850. }
  851. static void
  852. proxy_session_dtor (struct rspamd_proxy_session *session)
  853. {
  854. guint i;
  855. gint cbref;
  856. struct rspamd_proxy_backend_connection *conn;
  857. if (session->master_conn && session->master_conn->results) {
  858. for (i = 0; i < session->ctx->cmp_refs->len; i++) {
  859. cbref = g_array_index (session->ctx->cmp_refs, gint, i);
  860. proxy_call_cmp_script (session, cbref);
  861. }
  862. }
  863. if (session->master_conn) {
  864. proxy_backend_close_connection (session->master_conn);
  865. }
  866. if (session->client_milter_conn) {
  867. rspamd_milter_session_unref (session->client_milter_conn);
  868. }
  869. else if (session->client_conn) {
  870. rspamd_http_connection_reset (session->client_conn);
  871. rspamd_http_connection_unref (session->client_conn);
  872. }
  873. if (session->map && session->map_len) {
  874. munmap (session->map, session->map_len);
  875. }
  876. for (i = 0; i < session->mirror_conns->len; i ++) {
  877. conn = g_ptr_array_index (session->mirror_conns, i);
  878. if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  879. proxy_backend_close_connection (conn);
  880. }
  881. if (conn->results) {
  882. ucl_object_unref (conn->results);
  883. }
  884. }
  885. if (session->master_conn) {
  886. if (session->master_conn->results) {
  887. ucl_object_unref (session->master_conn->results);
  888. }
  889. if (session->master_conn->task) {
  890. rspamd_session_destroy (session->master_conn->task->s);
  891. }
  892. }
  893. g_ptr_array_free (session->mirror_conns, TRUE);
  894. rspamd_http_message_shmem_unref (session->shmem_ref);
  895. rspamd_http_message_unref (session->client_message);
  896. if (session->client_addr) {
  897. rspamd_inet_address_free (session->client_addr);
  898. }
  899. if (session->client_sock != -1) {
  900. close (session->client_sock);
  901. }
  902. if (session->ctx->sessions_cache) {
  903. rspamd_worker_session_cache_remove (session->ctx->sessions_cache,
  904. session);
  905. }
  906. if (session->pool) {
  907. rspamd_mempool_delete (session->pool);
  908. }
  909. g_free (session);
  910. }
  911. static void
  912. proxy_request_compress (struct rspamd_http_message *msg)
  913. {
  914. guint flags;
  915. ZSTD_CCtx *zctx;
  916. rspamd_fstring_t *body;
  917. const gchar *in;
  918. gsize inlen;
  919. flags = rspamd_http_message_get_flags (msg);
  920. if (!rspamd_http_message_find_header (msg, "Compression")) {
  921. if ((flags & RSPAMD_HTTP_FLAG_SHMEM) ||
  922. !(flags & RSPAMD_HTTP_FLAG_HAS_BODY)) {
  923. /* Cannot compress shared or empty message */
  924. return;
  925. }
  926. in = rspamd_http_message_get_body (msg, &inlen);
  927. if (in == NULL || inlen == 0) {
  928. return;
  929. }
  930. body = rspamd_fstring_sized_new (ZSTD_compressBound (inlen));
  931. zctx = ZSTD_createCCtx ();
  932. body->len = ZSTD_compressCCtx (zctx, body->str, body->allocated,
  933. in, inlen, 1);
  934. if (ZSTD_isError (body->len)) {
  935. msg_err ("compression error");
  936. rspamd_fstring_free (body);
  937. ZSTD_freeCCtx (zctx);
  938. return;
  939. }
  940. ZSTD_freeCCtx (zctx);
  941. rspamd_http_message_set_body_from_fstring_steal (msg, body);
  942. rspamd_http_message_add_header (msg, "Compression", "zstd");
  943. }
  944. }
  945. static void
  946. proxy_request_decompress (struct rspamd_http_message *msg)
  947. {
  948. rspamd_fstring_t *body;
  949. const gchar *in;
  950. gsize inlen, outlen, r;
  951. ZSTD_DStream *zstream;
  952. ZSTD_inBuffer zin;
  953. ZSTD_outBuffer zout;
  954. if (rspamd_http_message_find_header (msg, "Compression")) {
  955. in = rspamd_http_message_get_body (msg, &inlen);
  956. if (in == NULL || inlen == 0) {
  957. return;
  958. }
  959. zstream = ZSTD_createDStream ();
  960. ZSTD_initDStream (zstream);
  961. zin.pos = 0;
  962. zin.src = in;
  963. zin.size = inlen;
  964. if ((outlen = ZSTD_getDecompressedSize (zin.src, zin.size)) == 0) {
  965. outlen = ZSTD_DStreamOutSize ();
  966. }
  967. body = rspamd_fstring_sized_new (outlen);
  968. zout.dst = body->str;
  969. zout.pos = 0;
  970. zout.size = outlen;
  971. while (zin.pos < zin.size) {
  972. r = ZSTD_decompressStream (zstream, &zout, &zin);
  973. if (ZSTD_isError (r)) {
  974. msg_err ("Decompression error: %s", ZSTD_getErrorName (r));
  975. ZSTD_freeDStream (zstream);
  976. rspamd_fstring_free (body);
  977. return;
  978. }
  979. if (zout.pos == zout.size) {
  980. /* We need to extend output buffer */
  981. zout.size = zout.size * 1.5 + 1.0;
  982. body = rspamd_fstring_grow (body, zout.size);
  983. zout.size = body->allocated;
  984. zout.dst = body->str;
  985. }
  986. }
  987. body->len = zout.pos;
  988. ZSTD_freeDStream (zstream);
  989. rspamd_http_message_set_body_from_fstring_steal (msg, body);
  990. rspamd_http_message_remove_header (msg, "Compression");
  991. }
  992. return;
  993. }
  994. static struct rspamd_proxy_session *
  995. proxy_session_refresh (struct rspamd_proxy_session *session)
  996. {
  997. struct rspamd_proxy_session *nsession;
  998. nsession = g_malloc0 (sizeof (*nsession));
  999. nsession->client_milter_conn = session->client_milter_conn;
  1000. session->client_milter_conn = NULL;
  1001. rspamd_milter_update_userdata (nsession->client_milter_conn,
  1002. nsession);
  1003. nsession->client_addr = session->client_addr;
  1004. session->client_addr = NULL;
  1005. nsession->ctx = session->ctx;
  1006. nsession->worker = session->worker;
  1007. nsession->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (), "proxy");
  1008. nsession->client_sock = session->client_sock;
  1009. session->client_sock = -1;
  1010. nsession->mirror_conns = g_ptr_array_sized_new (nsession->ctx->mirrors->len);
  1011. REF_INIT_RETAIN (nsession, proxy_session_dtor);
  1012. if (nsession->ctx->sessions_cache) {
  1013. rspamd_worker_session_cache_add (nsession->ctx->sessions_cache,
  1014. nsession->pool->tag.uid, &nsession->ref.refcount, nsession);
  1015. }
  1016. return nsession;
  1017. }
  1018. static gboolean
  1019. proxy_check_file (struct rspamd_http_message *msg,
  1020. struct rspamd_proxy_session *session)
  1021. {
  1022. const rspamd_ftok_t *tok, *key_tok;
  1023. rspamd_ftok_t srch;
  1024. gchar *file_str;
  1025. GHashTable *query_args;
  1026. GHashTableIter it;
  1027. gpointer k, v;
  1028. struct http_parser_url u;
  1029. rspamd_fstring_t *new_url;
  1030. tok = rspamd_http_message_find_header (msg, "File");
  1031. if (tok) {
  1032. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  1033. session->map = rspamd_file_xmap (file_str, PROT_READ, &session->map_len,
  1034. TRUE);
  1035. if (session->map == NULL) {
  1036. if (session->map_len != 0) {
  1037. msg_err_session ("cannot map %s: %s", file_str,
  1038. strerror (errno));
  1039. return FALSE;
  1040. }
  1041. }
  1042. /* Remove header after processing */
  1043. rspamd_http_message_remove_header (msg, "File");
  1044. session->fname = file_str;
  1045. }
  1046. else {
  1047. /* Need to parse query URL */
  1048. if (http_parser_parse_url (RSPAMD_FSTRING_DATA (msg->url),
  1049. RSPAMD_FSTRING_LEN (msg->url), 0, &u) != 0) {
  1050. msg_err_session ("bad request url: %V", msg->url);
  1051. return FALSE;
  1052. }
  1053. if (u.field_set & (1 << UF_QUERY)) {
  1054. /* In case if we have a query, we need to store it somewhere */
  1055. query_args = rspamd_http_message_parse_query (msg);
  1056. srch.begin = "File";
  1057. srch.len = strlen ("File");
  1058. tok = g_hash_table_lookup (query_args, &srch);
  1059. if (tok) {
  1060. file_str = rspamd_mempool_ftokdup (session->pool, tok);
  1061. session->map = rspamd_file_xmap (file_str, PROT_READ,
  1062. &session->map_len, TRUE);
  1063. if (session->map == NULL) {
  1064. if (session->map_len != 0) {
  1065. msg_err_session ("cannot map %s: %s", file_str,
  1066. strerror (errno));
  1067. g_hash_table_unref (query_args);
  1068. return FALSE;
  1069. }
  1070. }
  1071. /* We need to create a new URL with file attribute removed */
  1072. new_url = rspamd_fstring_new_init (RSPAMD_FSTRING_DATA (msg->url),
  1073. u.field_data[UF_QUERY].off);
  1074. new_url = rspamd_fstring_append (new_url, "?", 1);
  1075. g_hash_table_iter_init (&it, query_args);
  1076. while (g_hash_table_iter_next (&it, &k, &v)) {
  1077. key_tok = k;
  1078. tok = v;
  1079. if (!rspamd_ftok_icase_equal (key_tok, &srch)) {
  1080. rspamd_printf_fstring (&new_url, "%T=%T&",
  1081. key_tok, tok);
  1082. }
  1083. }
  1084. /* Erase last character (might be either & or ?) */
  1085. rspamd_fstring_erase (new_url, new_url->len - 1, 1);
  1086. rspamd_fstring_free (msg->url);
  1087. msg->url = new_url;
  1088. session->fname = file_str;
  1089. }
  1090. g_hash_table_unref (query_args);
  1091. }
  1092. }
  1093. return TRUE;
  1094. }
  1095. static void
  1096. proxy_backend_mirror_error_handler (struct rspamd_http_connection *conn, GError *err)
  1097. {
  1098. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1099. struct rspamd_proxy_session *session;
  1100. session = bk_conn->s;
  1101. msg_info_session ("abnormally closing connection from backend: %s:%s, "
  1102. "error: %e",
  1103. bk_conn->name,
  1104. rspamd_inet_address_to_string (rspamd_upstream_addr (bk_conn->up)),
  1105. err);
  1106. if (err) {
  1107. bk_conn->err = rspamd_mempool_strdup (session->pool, err->message);
  1108. }
  1109. rspamd_upstream_fail (bk_conn->up, FALSE);
  1110. proxy_backend_close_connection (bk_conn);
  1111. REF_RELEASE (bk_conn->s);
  1112. }
  1113. static gint
  1114. proxy_backend_mirror_finish_handler (struct rspamd_http_connection *conn,
  1115. struct rspamd_http_message *msg)
  1116. {
  1117. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1118. struct rspamd_proxy_session *session;
  1119. session = bk_conn->s;
  1120. proxy_request_decompress (msg);
  1121. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  1122. bk_conn->parser_from_ref, msg->body_buf.begin, msg->body_buf.len)) {
  1123. msg_warn_session ("cannot parse results from the mirror backend %s:%s",
  1124. bk_conn->name,
  1125. rspamd_inet_address_to_string (rspamd_upstream_addr (bk_conn->up)));
  1126. bk_conn->err = "cannot parse ucl";
  1127. }
  1128. msg_info_session ("finished mirror connection to %s", bk_conn->name);
  1129. rspamd_upstream_ok (bk_conn->up);
  1130. proxy_backend_close_connection (bk_conn);
  1131. REF_RELEASE (bk_conn->s);
  1132. return 0;
  1133. }
  1134. static void
  1135. proxy_open_mirror_connections (struct rspamd_proxy_session *session)
  1136. {
  1137. gdouble coin;
  1138. struct rspamd_http_mirror *m;
  1139. guint i;
  1140. struct rspamd_proxy_backend_connection *bk_conn;
  1141. struct rspamd_http_message *msg;
  1142. GError *err = NULL;
  1143. coin = rspamd_random_double ();
  1144. for (i = 0; i < session->ctx->mirrors->len; i ++) {
  1145. m = g_ptr_array_index (session->ctx->mirrors, i);
  1146. if (m->prob < coin) {
  1147. /* No luck */
  1148. continue;
  1149. }
  1150. bk_conn = rspamd_mempool_alloc0 (session->pool,
  1151. sizeof (*bk_conn));
  1152. bk_conn->s = session;
  1153. bk_conn->name = m->name;
  1154. bk_conn->io_tv = &m->io_tv;
  1155. bk_conn->up = rspamd_upstream_get (m->u,
  1156. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1157. bk_conn->parser_from_ref = m->parser_from_ref;
  1158. bk_conn->parser_to_ref = m->parser_to_ref;
  1159. if (bk_conn->up == NULL) {
  1160. msg_err_session ("cannot select upstream for %s", m->name);
  1161. continue;
  1162. }
  1163. bk_conn->backend_sock = rspamd_inet_address_connect (
  1164. rspamd_upstream_addr (bk_conn->up),
  1165. SOCK_STREAM, TRUE);
  1166. if (bk_conn->backend_sock == -1) {
  1167. msg_err_session ("cannot connect upstream for %s", m->name);
  1168. rspamd_upstream_fail (bk_conn->up, TRUE);
  1169. continue;
  1170. }
  1171. msg = rspamd_http_connection_copy_msg (session->client_message, &err);
  1172. if (msg == NULL) {
  1173. msg_err_session ("cannot copy message to send to a mirror %s: %e",
  1174. m->name, err);
  1175. if (err) {
  1176. g_error_free (err);
  1177. }
  1178. continue;
  1179. }
  1180. if (msg->url->len == 0) {
  1181. msg->url = rspamd_fstring_append (msg->url, "/check", strlen ("/check"));
  1182. }
  1183. if (m->settings_id != NULL) {
  1184. rspamd_http_message_remove_header (msg, "Settings-ID");
  1185. rspamd_http_message_add_header (msg, "Settings-ID", m->settings_id);
  1186. }
  1187. bk_conn->backend_conn = rspamd_http_connection_new (NULL,
  1188. proxy_backend_mirror_error_handler,
  1189. proxy_backend_mirror_finish_handler,
  1190. RSPAMD_HTTP_CLIENT_SIMPLE,
  1191. RSPAMD_HTTP_CLIENT,
  1192. session->ctx->keys_cache,
  1193. NULL);
  1194. if (m->key) {
  1195. rspamd_http_connection_set_key (bk_conn->backend_conn,
  1196. session->ctx->local_key);
  1197. msg->peer_key = rspamd_pubkey_ref (m->key);
  1198. }
  1199. if (m->local ||
  1200. rspamd_inet_address_is_local (
  1201. rspamd_upstream_addr (bk_conn->up), FALSE)) {
  1202. if (session->fname) {
  1203. rspamd_http_message_add_header (msg, "File", session->fname);
  1204. }
  1205. msg->method = HTTP_GET;
  1206. rspamd_http_connection_write_message_shared (bk_conn->backend_conn,
  1207. msg, NULL, NULL, bk_conn,
  1208. bk_conn->backend_sock,
  1209. bk_conn->io_tv, session->ctx->ev_base);
  1210. }
  1211. else {
  1212. if (session->fname) {
  1213. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1214. rspamd_http_message_set_body (msg, session->map, session->map_len);
  1215. }
  1216. msg->method = HTTP_POST;
  1217. if (m->compress) {
  1218. proxy_request_compress (msg);
  1219. if (session->client_milter_conn) {
  1220. rspamd_http_message_add_header (msg, "Content-Type",
  1221. "application/octet-stream");
  1222. }
  1223. }
  1224. else {
  1225. if (session->client_milter_conn) {
  1226. rspamd_http_message_add_header (msg, "Content-Type",
  1227. "text/plain");
  1228. }
  1229. }
  1230. rspamd_http_connection_write_message (bk_conn->backend_conn,
  1231. msg, NULL, NULL, bk_conn,
  1232. bk_conn->backend_sock,
  1233. bk_conn->io_tv, session->ctx->ev_base);
  1234. }
  1235. g_ptr_array_add (session->mirror_conns, bk_conn);
  1236. REF_RETAIN (session);
  1237. msg_info_session ("send request to %s", m->name);
  1238. }
  1239. }
  1240. static void
  1241. proxy_client_write_error (struct rspamd_proxy_session *session, gint code,
  1242. const gchar *status)
  1243. {
  1244. struct rspamd_http_message *reply;
  1245. if (session->client_milter_conn) {
  1246. rspamd_milter_send_action (session->client_milter_conn,
  1247. RSPAMD_MILTER_TEMPFAIL);
  1248. REF_RELEASE (session);
  1249. }
  1250. else {
  1251. reply = rspamd_http_new_message (HTTP_RESPONSE);
  1252. reply->code = code;
  1253. reply->status = rspamd_fstring_new_init (status, strlen (status));
  1254. rspamd_http_connection_write_message (session->client_conn,
  1255. reply, NULL, NULL, session, session->client_sock,
  1256. &session->ctx->io_tv, session->ctx->ev_base);
  1257. }
  1258. }
  1259. static void
  1260. proxy_backend_master_error_handler (struct rspamd_http_connection *conn, GError *err)
  1261. {
  1262. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1263. struct rspamd_proxy_session *session;
  1264. session = bk_conn->s;
  1265. msg_info_session ("abnormally closing connection from backend: %s, error: %e,"
  1266. " retries left: %d",
  1267. rspamd_inet_address_to_string (rspamd_upstream_addr (session->master_conn->up)),
  1268. err,
  1269. session->ctx->max_retries - session->retries);
  1270. session->retries ++;
  1271. rspamd_upstream_fail (bk_conn->up, FALSE);
  1272. proxy_backend_close_connection (session->master_conn);
  1273. if (session->ctx->max_retries &&
  1274. session->retries > session->ctx->max_retries) {
  1275. msg_err_session ("cannot connect to upstream, maximum retries "
  1276. "has been reached: %d", session->retries);
  1277. /* Terminate session immediately */
  1278. proxy_client_write_error (session, err->code, err->message);
  1279. }
  1280. else {
  1281. if (!proxy_send_master_message (session)) {
  1282. proxy_client_write_error (session, err->code, err->message);
  1283. }
  1284. else {
  1285. msg_info_session ("retry connection to: %s"
  1286. " retries left: %d",
  1287. rspamd_inet_address_to_string (
  1288. rspamd_upstream_addr (session->master_conn->up)),
  1289. session->ctx->max_retries - session->retries);
  1290. }
  1291. }
  1292. }
  1293. static gint
  1294. proxy_backend_master_finish_handler (struct rspamd_http_connection *conn,
  1295. struct rspamd_http_message *msg)
  1296. {
  1297. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1298. struct rspamd_proxy_session *session, *nsession;
  1299. rspamd_fstring_t *reply;
  1300. session = bk_conn->s;
  1301. rspamd_http_connection_steal_msg (session->master_conn->backend_conn);
  1302. proxy_request_decompress (msg);
  1303. rspamd_http_message_remove_header (msg, "Content-Length");
  1304. rspamd_http_message_remove_header (msg, "Key");
  1305. rspamd_http_connection_reset (session->master_conn->backend_conn);
  1306. if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
  1307. bk_conn->parser_from_ref, msg->body_buf.begin, msg->body_buf.len)) {
  1308. msg_warn_session ("cannot parse results from the master backend");
  1309. }
  1310. if (session->legacy_support > LEGACY_SUPPORT_NO) {
  1311. /* We need to reformat ucl to fit with legacy spamc protocol */
  1312. if (bk_conn->results) {
  1313. reply = rspamd_fstring_new ();
  1314. if (session->legacy_support == LEGACY_SUPPORT_SPAMC) {
  1315. rspamd_ucl_tospamc_output (bk_conn->results, &reply);
  1316. msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
  1317. }
  1318. else {
  1319. rspamd_ucl_torspamc_output (bk_conn->results, &reply);
  1320. }
  1321. rspamd_http_message_set_body_from_fstring_steal (msg, reply);
  1322. msg->method = HTTP_SYMBOLS;
  1323. }
  1324. else {
  1325. msg_warn_session ("cannot parse results from the master backend, "
  1326. "return them as is");
  1327. }
  1328. }
  1329. rspamd_upstream_ok (bk_conn->up);
  1330. if (session->client_milter_conn) {
  1331. nsession = proxy_session_refresh (session);
  1332. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1333. session->master_conn->results);
  1334. REF_RELEASE (session);
  1335. rspamd_http_message_free (msg);
  1336. }
  1337. else {
  1338. rspamd_http_connection_write_message (session->client_conn,
  1339. msg, NULL, NULL, session, session->client_sock,
  1340. bk_conn->io_tv, session->ctx->ev_base);
  1341. }
  1342. return 0;
  1343. }
  1344. static void
  1345. rspamd_proxy_scan_self_reply (struct rspamd_task *task)
  1346. {
  1347. struct rspamd_http_message *msg;
  1348. struct rspamd_proxy_session *session = task->fin_arg, *nsession;
  1349. ucl_object_t *rep = NULL;
  1350. const char *ctype = "application/json";
  1351. msg = rspamd_http_new_message (HTTP_RESPONSE);
  1352. msg->date = time (NULL);
  1353. msg->code = 200;
  1354. switch (task->cmd) {
  1355. case CMD_REPORT_IFSPAM:
  1356. case CMD_REPORT:
  1357. case CMD_CHECK:
  1358. case CMD_SYMBOLS:
  1359. case CMD_PROCESS:
  1360. case CMD_SKIP:
  1361. case CMD_CHECK_V2:
  1362. rspamd_task_set_finish_time (task);
  1363. rspamd_protocol_http_reply (msg, task, &rep);
  1364. rspamd_protocol_write_log_pipe (task);
  1365. break;
  1366. case CMD_PING:
  1367. rspamd_http_message_set_body (msg, "pong" CRLF, 6);
  1368. ctype = "text/plain";
  1369. break;
  1370. case CMD_OTHER:
  1371. msg_err_task ("BROKEN");
  1372. break;
  1373. }
  1374. session->master_conn->flags |= RSPAMD_BACKEND_CLOSED;
  1375. if (rep) {
  1376. session->master_conn->results = ucl_object_ref (rep);
  1377. }
  1378. if (session->client_milter_conn) {
  1379. nsession = proxy_session_refresh (session);
  1380. rspamd_milter_send_task_results (nsession->client_milter_conn,
  1381. session->master_conn->results);
  1382. rspamd_http_message_free (msg);
  1383. REF_RELEASE (session);
  1384. }
  1385. else {
  1386. rspamd_http_connection_reset (session->client_conn);
  1387. rspamd_http_connection_write_message (session->client_conn,
  1388. msg,
  1389. NULL,
  1390. ctype,
  1391. session,
  1392. session->client_sock,
  1393. NULL,
  1394. session->ctx->ev_base);
  1395. }
  1396. }
  1397. static gboolean
  1398. rspamd_proxy_task_fin (void *ud)
  1399. {
  1400. struct rspamd_task *task = ud;
  1401. msg_debug_task ("finish task");
  1402. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  1403. rspamd_proxy_scan_self_reply (task);
  1404. return TRUE;
  1405. }
  1406. if (!rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL)) {
  1407. rspamd_proxy_scan_self_reply (task);
  1408. return TRUE;
  1409. }
  1410. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  1411. rspamd_proxy_scan_self_reply (task);
  1412. return TRUE;
  1413. }
  1414. /* One more iteration */
  1415. return FALSE;
  1416. }
  1417. static gboolean
  1418. rspamd_proxy_self_scan (struct rspamd_proxy_session *session)
  1419. {
  1420. struct rspamd_task *task;
  1421. struct rspamd_http_message *msg;
  1422. const gchar *data;
  1423. gsize len;
  1424. msg = session->client_message;
  1425. task = rspamd_task_new (session->worker, session->ctx->cfg,
  1426. session->pool, session->ctx->lang_det,
  1427. session->ctx->ev_base);
  1428. task->flags |= RSPAMD_TASK_FLAG_MIME;
  1429. task->sock = -1;
  1430. if (session->client_milter_conn) {
  1431. task->client_addr = rspamd_inet_address_copy (
  1432. session->client_milter_conn->addr);
  1433. }
  1434. else {
  1435. task->client_addr = rspamd_inet_address_copy (session->client_addr);
  1436. }
  1437. task->fin_arg = session;
  1438. task->resolver = session->ctx->resolver;
  1439. /* TODO: allow to disable autolearn in protocol */
  1440. task->flags |= RSPAMD_TASK_FLAG_LEARN_AUTO;
  1441. task->s = rspamd_session_create (task->task_pool, rspamd_proxy_task_fin,
  1442. NULL, (event_finalizer_t )rspamd_task_free, task);
  1443. data = rspamd_http_message_get_body (msg, &len);
  1444. if (session->backend->settings_id) {
  1445. rspamd_http_message_remove_header (msg, "Settings-ID");
  1446. rspamd_http_message_add_header (msg, "Settings-ID",
  1447. session->backend->settings_id);
  1448. }
  1449. /* Process message */
  1450. if (!rspamd_protocol_handle_request (task, msg)) {
  1451. msg_err_task ("cannot handle request: %e", task->err);
  1452. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1453. }
  1454. else {
  1455. if (task->cmd == CMD_PING) {
  1456. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1457. }
  1458. else {
  1459. if (!rspamd_task_load_message (task, msg, data, len)) {
  1460. msg_err_task ("cannot load message: %e", task->err);
  1461. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1462. }
  1463. }
  1464. }
  1465. /* Set global timeout for the task */
  1466. if (session->ctx->default_upstream->timeout > 0.0) {
  1467. struct timeval task_tv;
  1468. event_set (&task->timeout_ev, -1, EV_TIMEOUT, rspamd_task_timeout,
  1469. task);
  1470. event_base_set (session->ctx->ev_base, &task->timeout_ev);
  1471. double_to_tv (session->ctx->default_upstream->timeout, &task_tv);
  1472. event_add (&task->timeout_ev, &task_tv);
  1473. }
  1474. session->master_conn->task = task;
  1475. rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL);
  1476. rspamd_session_pending (task->s);
  1477. return TRUE;
  1478. }
  1479. static gboolean
  1480. proxy_send_master_message (struct rspamd_proxy_session *session)
  1481. {
  1482. struct rspamd_http_message *msg;
  1483. struct rspamd_http_upstream *backend = NULL;
  1484. const rspamd_ftok_t *host;
  1485. GError *err = NULL;
  1486. gchar hostbuf[512];
  1487. host = rspamd_http_message_find_header (session->client_message, "Host");
  1488. if (host == NULL) {
  1489. backend = session->ctx->default_upstream;
  1490. }
  1491. else {
  1492. rspamd_strlcpy (hostbuf, host->begin, MIN(host->len + 1, sizeof (hostbuf)));
  1493. backend = g_hash_table_lookup (session->ctx->upstreams, hostbuf);
  1494. if (backend == NULL) {
  1495. backend = session->ctx->default_upstream;
  1496. }
  1497. }
  1498. if (backend == NULL) {
  1499. /* No backend */
  1500. msg_err_session ("cannot find upstream for %s", host ? hostbuf : "default");
  1501. goto err;
  1502. }
  1503. else {
  1504. session->backend = backend;
  1505. if (backend->self_scan) {
  1506. return rspamd_proxy_self_scan (session);
  1507. }
  1508. retry:
  1509. if (session->ctx->max_retries &&
  1510. session->retries > session->ctx->max_retries) {
  1511. msg_err_session ("cannot connect to upstream, maximum retries "
  1512. "has been reached: %d", session->retries);
  1513. goto err;
  1514. }
  1515. session->master_conn->up = rspamd_upstream_get (backend->u,
  1516. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1517. session->master_conn->io_tv = &backend->io_tv;
  1518. if (session->master_conn->up == NULL) {
  1519. msg_err_session ("cannot select upstream for %s",
  1520. host ? hostbuf : "default");
  1521. goto err;
  1522. }
  1523. session->master_conn->backend_sock = rspamd_inet_address_connect (
  1524. rspamd_upstream_addr (session->master_conn->up),
  1525. SOCK_STREAM, TRUE);
  1526. if (session->master_conn->backend_sock == -1) {
  1527. msg_err_session ("cannot connect upstream: %s(%s)",
  1528. host ? hostbuf : "default",
  1529. rspamd_inet_address_to_string (rspamd_upstream_addr (
  1530. session->master_conn->up)));
  1531. rspamd_upstream_fail (session->master_conn->up, TRUE);
  1532. session->retries ++;
  1533. goto retry;
  1534. }
  1535. msg = rspamd_http_connection_copy_msg (session->client_message, &err);
  1536. if (msg == NULL) {
  1537. msg_err_session ("cannot copy message to send it to the upstream: %e",
  1538. err);
  1539. if (err) {
  1540. g_error_free (err);
  1541. }
  1542. goto err; /* No fallback here */
  1543. }
  1544. session->master_conn->backend_conn = rspamd_http_connection_new (
  1545. NULL,
  1546. proxy_backend_master_error_handler,
  1547. proxy_backend_master_finish_handler,
  1548. RSPAMD_HTTP_CLIENT_SIMPLE,
  1549. RSPAMD_HTTP_CLIENT,
  1550. session->ctx->keys_cache,
  1551. NULL);
  1552. session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED;
  1553. session->master_conn->parser_from_ref = backend->parser_from_ref;
  1554. session->master_conn->parser_to_ref = backend->parser_to_ref;
  1555. if (backend->key) {
  1556. msg->peer_key = rspamd_pubkey_ref (backend->key);
  1557. rspamd_http_connection_set_key (session->master_conn->backend_conn,
  1558. session->ctx->local_key);
  1559. }
  1560. if (backend->settings_id != NULL) {
  1561. rspamd_http_message_remove_header (msg, "Settings-ID");
  1562. rspamd_http_message_add_header (msg, "Settings-ID",
  1563. backend->settings_id);
  1564. }
  1565. if (backend->local ||
  1566. rspamd_inet_address_is_local (
  1567. rspamd_upstream_addr (session->master_conn->up), FALSE)) {
  1568. if (session->fname) {
  1569. rspamd_http_message_add_header (msg, "File", session->fname);
  1570. }
  1571. msg->method = HTTP_GET;
  1572. rspamd_http_connection_write_message_shared (
  1573. session->master_conn->backend_conn,
  1574. msg, NULL, NULL, session->master_conn,
  1575. session->master_conn->backend_sock,
  1576. session->master_conn->io_tv, session->ctx->ev_base);
  1577. }
  1578. else {
  1579. if (session->fname) {
  1580. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1581. rspamd_http_message_set_body (msg,
  1582. session->map, session->map_len);
  1583. }
  1584. msg->method = HTTP_POST;
  1585. if (backend->compress) {
  1586. proxy_request_compress (msg);
  1587. if (session->client_milter_conn) {
  1588. rspamd_http_message_add_header (msg, "Content-Type",
  1589. "application/octet-stream");
  1590. }
  1591. }
  1592. else {
  1593. if (session->client_milter_conn) {
  1594. rspamd_http_message_add_header (msg, "Content-Type",
  1595. "text/plain");
  1596. }
  1597. }
  1598. rspamd_http_connection_write_message (
  1599. session->master_conn->backend_conn,
  1600. msg, NULL, NULL, session->master_conn,
  1601. session->master_conn->backend_sock,
  1602. session->master_conn->io_tv, session->ctx->ev_base);
  1603. }
  1604. }
  1605. return TRUE;
  1606. err:
  1607. if (session->client_milter_conn) {
  1608. rspamd_milter_send_action (session->client_milter_conn,
  1609. RSPAMD_MILTER_TEMPFAIL);
  1610. REF_RELEASE (session);
  1611. }
  1612. else {
  1613. rspamd_http_connection_steal_msg (session->client_conn);
  1614. rspamd_http_connection_reset (session->client_conn);
  1615. proxy_client_write_error (session, 404, "Backend not found");
  1616. }
  1617. return FALSE;
  1618. }
  1619. static void
  1620. proxy_client_error_handler (struct rspamd_http_connection *conn, GError *err)
  1621. {
  1622. struct rspamd_proxy_session *session = conn->ud;
  1623. msg_info_session ("abnormally closing connection from: %s, error: %s",
  1624. rspamd_inet_address_to_string (session->client_addr), err->message);
  1625. /* Terminate session immediately */
  1626. proxy_backend_close_connection (session->master_conn);
  1627. REF_RELEASE (session);
  1628. }
  1629. static gint
  1630. proxy_client_finish_handler (struct rspamd_http_connection *conn,
  1631. struct rspamd_http_message *msg)
  1632. {
  1633. struct rspamd_proxy_session *session = conn->ud;
  1634. if (!session->master_conn) {
  1635. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1636. sizeof (*session->master_conn));
  1637. session->master_conn->s = session;
  1638. session->master_conn->name = "master";
  1639. /* Reset spamc legacy */
  1640. if (msg->method >= HTTP_SYMBOLS) {
  1641. msg->method = HTTP_POST;
  1642. if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) {
  1643. session->legacy_support = LEGACY_SUPPORT_SPAMC;
  1644. msg_info_session ("enabling legacy spamc mode for session");
  1645. }
  1646. else {
  1647. session->legacy_support = LEGACY_SUPPORT_RSPAMC;
  1648. msg_info_session ("enabling legacy rspamc mode for session");
  1649. }
  1650. }
  1651. if (msg->url->len == 0) {
  1652. msg->url = rspamd_fstring_append (msg->url,
  1653. "/" MSG_CMD_CHECK_V2, strlen ("/" MSG_CMD_CHECK_V2));
  1654. }
  1655. if (!proxy_check_file (msg, session)) {
  1656. goto err;
  1657. }
  1658. session->client_message = rspamd_http_connection_steal_msg (
  1659. session->client_conn);
  1660. session->shmem_ref = rspamd_http_message_shmem_ref (session->client_message);
  1661. rspamd_http_message_remove_header (msg, "Content-Length");
  1662. rspamd_http_message_remove_header (msg, "Transfer-Encoding");
  1663. rspamd_http_message_remove_header (msg, "Keep-Alive");
  1664. rspamd_http_message_remove_header (msg, "Connection");
  1665. rspamd_http_message_remove_header (msg, "Key");
  1666. proxy_open_mirror_connections (session);
  1667. rspamd_http_connection_reset (session->client_conn);
  1668. proxy_send_master_message (session);
  1669. }
  1670. else {
  1671. msg_info_session ("finished master connection");
  1672. proxy_backend_close_connection (session->master_conn);
  1673. REF_RELEASE (session);
  1674. }
  1675. return 0;
  1676. err:
  1677. rspamd_http_connection_steal_msg (session->client_conn);
  1678. rspamd_http_message_remove_header (msg, "Content-Length");
  1679. rspamd_http_message_remove_header (msg, "Key");
  1680. rspamd_http_message_remove_header (msg, "Transfer-Encoding");
  1681. rspamd_http_message_remove_header (msg, "Keep-Alive");
  1682. rspamd_http_message_remove_header (msg, "Connection");
  1683. rspamd_http_connection_reset (session->client_conn);
  1684. proxy_client_write_error (session, 404, "Backend not found");
  1685. return 0;
  1686. }
  1687. static void
  1688. proxy_milter_finish_handler (gint fd,
  1689. struct rspamd_milter_session *rms,
  1690. void *ud)
  1691. {
  1692. struct rspamd_proxy_session *session = ud;
  1693. struct rspamd_http_message *msg;
  1694. session->client_milter_conn = rms;
  1695. if (rms->message == NULL || rms->message->len == 0) {
  1696. msg_info_session ("finished milter connection");
  1697. proxy_backend_close_connection (session->master_conn);
  1698. REF_RELEASE (session);
  1699. }
  1700. else {
  1701. if (!session->master_conn) {
  1702. session->master_conn = rspamd_mempool_alloc0 (session->pool,
  1703. sizeof (*session->master_conn));
  1704. }
  1705. msg = rspamd_milter_to_http (rms);
  1706. session->master_conn->s = session;
  1707. session->master_conn->name = "master";
  1708. session->client_message = msg;
  1709. proxy_open_mirror_connections (session);
  1710. proxy_send_master_message (session);
  1711. }
  1712. }
  1713. static void
  1714. proxy_milter_error_handler (gint fd,
  1715. struct rspamd_milter_session *rms,
  1716. void *ud, GError *err)
  1717. {
  1718. struct rspamd_proxy_session *session = ud;
  1719. msg_info_session ("abnormally closing milter connection from: %s, "
  1720. "error: %s", rspamd_inet_address_to_string (session->client_addr),
  1721. err->message);
  1722. /* Terminate session immediately */
  1723. proxy_backend_close_connection (session->master_conn);
  1724. REF_RELEASE (session);
  1725. }
  1726. static void
  1727. proxy_accept_socket (gint fd, short what, void *arg)
  1728. {
  1729. struct rspamd_worker *worker = (struct rspamd_worker *) arg;
  1730. struct rspamd_proxy_ctx *ctx;
  1731. rspamd_inet_addr_t *addr;
  1732. struct rspamd_proxy_session *session;
  1733. gint nfd;
  1734. ctx = worker->ctx;
  1735. if ((nfd =
  1736. rspamd_accept_from_socket (fd, &addr, worker->accept_events)) == -1) {
  1737. msg_warn ("accept failed: %s", strerror (errno));
  1738. return;
  1739. }
  1740. /* Check for EAGAIN */
  1741. if (nfd == 0) {
  1742. return;
  1743. }
  1744. session = g_malloc0 (sizeof (*session));
  1745. REF_INIT_RETAIN (session, proxy_session_dtor);
  1746. session->client_sock = nfd;
  1747. session->client_addr = addr;
  1748. session->mirror_conns = g_ptr_array_sized_new (ctx->mirrors->len);
  1749. session->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (),
  1750. "proxy");
  1751. session->ctx = ctx;
  1752. session->worker = worker;
  1753. if (ctx->sessions_cache) {
  1754. rspamd_worker_session_cache_add (ctx->sessions_cache,
  1755. session->pool->tag.uid, &session->ref.refcount, session);
  1756. }
  1757. if (!ctx->milter) {
  1758. session->client_conn = rspamd_http_connection_new (NULL,
  1759. proxy_client_error_handler,
  1760. proxy_client_finish_handler,
  1761. 0,
  1762. RSPAMD_HTTP_SERVER,
  1763. ctx->keys_cache,
  1764. NULL);
  1765. if (ctx->key) {
  1766. rspamd_http_connection_set_key (session->client_conn, ctx->key);
  1767. }
  1768. msg_info_session ("accepted http connection from %s port %d",
  1769. rspamd_inet_address_to_string (addr),
  1770. rspamd_inet_address_get_port (addr));
  1771. rspamd_http_connection_read_message_shared (session->client_conn,
  1772. session,
  1773. nfd,
  1774. &ctx->io_tv,
  1775. ctx->ev_base);
  1776. }
  1777. else {
  1778. msg_info_session ("accepted milter connection from %s port %d",
  1779. rspamd_inet_address_to_string (addr),
  1780. rspamd_inet_address_get_port (addr));
  1781. #ifdef TCP_NODELAY
  1782. #ifndef SOL_TCP
  1783. #define SOL_TCP IPPROTO_TCP
  1784. #endif
  1785. if (rspamd_inet_address_get_af (addr) != AF_UNIX) {
  1786. gint sopt = 1;
  1787. if (setsockopt (nfd, SOL_TCP, TCP_NODELAY, &sopt, sizeof (sopt)) ==
  1788. -1) {
  1789. msg_warn_session ("cannot set TCP_NODELAY: %s",
  1790. strerror (errno));
  1791. }
  1792. }
  1793. #endif
  1794. rspamd_milter_handle_socket (nfd, NULL,
  1795. session->pool,
  1796. ctx->ev_base,
  1797. proxy_milter_finish_handler,
  1798. proxy_milter_error_handler,
  1799. session);
  1800. }
  1801. }
  1802. static void
  1803. proxy_rotate_key (gint fd, short what, void *arg)
  1804. {
  1805. struct timeval rot_tv;
  1806. struct rspamd_proxy_ctx *ctx = arg;
  1807. gpointer kp;
  1808. double_to_tv (ctx->rotate_tm, &rot_tv);
  1809. rot_tv.tv_sec += ottery_rand_range (rot_tv.tv_sec);
  1810. event_del (&ctx->rotate_ev);
  1811. event_add (&ctx->rotate_ev, &rot_tv);
  1812. kp = ctx->local_key;
  1813. ctx->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
  1814. RSPAMD_CRYPTOBOX_MODE_25519);
  1815. rspamd_keypair_unref (kp);
  1816. }
  1817. static void
  1818. adjust_upstreams_limits (struct rspamd_proxy_ctx *ctx)
  1819. {
  1820. struct rspamd_http_upstream *backend;
  1821. gpointer k, v;
  1822. GHashTableIter it;
  1823. /*
  1824. * We set error time equal to max_retries * backend_timeout and max_errors
  1825. * to max_retries - 1
  1826. *
  1827. * So if we failed to scan a message on a backend for some reasons, we
  1828. * will try to re-resolve it faster
  1829. */
  1830. g_hash_table_iter_init (&it, ctx->upstreams);
  1831. while (g_hash_table_iter_next (&it, &k, &v)) {
  1832. backend = (struct rspamd_http_upstream *)v;
  1833. if (!backend->self_scan && backend->u) {
  1834. rspamd_upstreams_set_limits (backend->u,
  1835. NAN, NAN, ctx->max_retries * backend->timeout, NAN,
  1836. ctx->max_retries - 1, 0);
  1837. }
  1838. }
  1839. }
  1840. void
  1841. start_rspamd_proxy (struct rspamd_worker *worker) {
  1842. struct rspamd_proxy_ctx *ctx = worker->ctx;
  1843. struct timeval rot_tv;
  1844. ctx->cfg = worker->srv->cfg;
  1845. ctx->ev_base = rspamd_prepare_worker (worker, "rspamd_proxy",
  1846. proxy_accept_socket);
  1847. ctx->resolver = dns_resolver_init (worker->srv->logger,
  1848. ctx->ev_base,
  1849. worker->srv->cfg);
  1850. double_to_tv (ctx->timeout, &ctx->io_tv);
  1851. rspamd_map_watch (worker->srv->cfg, ctx->ev_base, ctx->resolver, worker, 0);
  1852. rspamd_upstreams_library_config (worker->srv->cfg, ctx->cfg->ups_ctx,
  1853. ctx->ev_base, ctx->resolver->r);
  1854. /* XXX: stupid default */
  1855. ctx->keys_cache = rspamd_keypair_cache_new (256);
  1856. ctx->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
  1857. RSPAMD_CRYPTOBOX_MODE_25519);
  1858. double_to_tv (ctx->rotate_tm, &rot_tv);
  1859. rot_tv.tv_sec += ottery_rand_range (rot_tv.tv_sec);
  1860. event_set (&ctx->rotate_ev, -1, EV_TIMEOUT, proxy_rotate_key, ctx);
  1861. event_base_set (ctx->ev_base, &ctx->rotate_ev);
  1862. event_add (&ctx->rotate_ev, &rot_tv);
  1863. if (ctx->has_self_scan) {
  1864. /* Additional initialisation needed */
  1865. rspamd_worker_init_scanner (worker, ctx->ev_base, ctx->resolver,
  1866. &ctx->lang_det);
  1867. }
  1868. if (worker->srv->cfg->enable_sessions_cache) {
  1869. ctx->sessions_cache = rspamd_worker_session_cache_new (worker,
  1870. ctx->ev_base);
  1871. }
  1872. ctx->milter_ctx.spam_header = ctx->spam_header;
  1873. ctx->milter_ctx.discard_on_reject = ctx->discard_on_reject;
  1874. ctx->milter_ctx.quarantine_on_reject = ctx->quarantine_on_reject;
  1875. ctx->milter_ctx.sessions_cache = ctx->sessions_cache;
  1876. ctx->milter_ctx.client_ca_name = ctx->client_ca_name;
  1877. ctx->milter_ctx.reject_message = ctx->reject_message;
  1878. rspamd_milter_init_library (&ctx->milter_ctx);
  1879. rspamd_lua_run_postloads (ctx->cfg->lua_state, ctx->cfg, ctx->ev_base,
  1880. worker);
  1881. adjust_upstreams_limits (ctx);
  1882. event_base_loop (ctx->ev_base, 0);
  1883. rspamd_worker_block_signals ();
  1884. if (ctx->has_self_scan) {
  1885. rspamd_stat_close ();
  1886. }
  1887. rspamd_keypair_cache_destroy (ctx->keys_cache);
  1888. REF_RELEASE (ctx->cfg);
  1889. rspamd_log_close (worker->srv->logger, TRUE);
  1890. exit (EXIT_SUCCESS);
  1891. }