You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

fuzzy_storage.c 82KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. /*
  17. * Rspamd fuzzy storage server
  18. */
  19. #include "config.h"
  20. #include "libserver/fuzzy_wire.h"
  21. #include "util.h"
  22. #include "rspamd.h"
  23. #include "map.h"
  24. #include "map_helpers.h"
  25. #include "fuzzy_wire.h"
  26. #include "fuzzy_backend.h"
  27. #include "ottery.h"
  28. #include "ref.h"
  29. #include "xxhash.h"
  30. #include "libserver/worker_util.h"
  31. #include "libserver/rspamd_control.h"
  32. #include "libcryptobox/cryptobox.h"
  33. #include "libcryptobox/keypairs_cache.h"
  34. #include "libcryptobox/keypair.h"
  35. #include "libserver/rspamd_control.h"
  36. #include "libutil/hash.h"
  37. #include "libutil/map_private.h"
  38. #include "libutil/http_private.h"
  39. #include "libutil/http_router.h"
  40. #include "unix-std.h"
  41. #include <math.h>
  42. /* Resync value in seconds */
  43. #define DEFAULT_SYNC_TIMEOUT 60.0
  44. #define DEFAULT_KEYPAIR_CACHE_SIZE 512
  45. #define DEFAULT_MASTER_TIMEOUT 10.0
  46. #define DEFAULT_UPDATES_MAXFAIL 3
  47. #define COOKIE_SIZE 128
  48. #define DEFAULT_MAX_BUCKETS 2000
  49. #define DEFAULT_BUCKET_TTL 3600
  50. #define DEFAULT_BUCKET_MASK 24
  51. static const gchar *local_db_name = "local";
  52. #define msg_err_fuzzy_update(...) rspamd_default_log_function (G_LOG_LEVEL_CRITICAL, \
  53. session->name, session->uid, \
  54. G_STRFUNC, \
  55. __VA_ARGS__)
  56. #define msg_warn_fuzzy_update(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  57. session->name, session->uid, \
  58. G_STRFUNC, \
  59. __VA_ARGS__)
  60. #define msg_info_fuzzy_update(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  61. session->name, session->uid, \
  62. G_STRFUNC, \
  63. __VA_ARGS__)
  64. #define msg_err_fuzzy_collection(...) rspamd_default_log_function (G_LOG_LEVEL_CRITICAL, \
  65. "fuzzy_collection", session->uid, \
  66. G_STRFUNC, \
  67. __VA_ARGS__)
  68. #define msg_warn_fuzzy_collection(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
  69. "fuzzy_collection", session->uid, \
  70. G_STRFUNC, \
  71. __VA_ARGS__)
  72. #define msg_info_fuzzy_collection(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
  73. "fuzzy_collection", session->uid, \
  74. G_STRFUNC, \
  75. __VA_ARGS__)
  76. /* Init functions */
  77. gpointer init_fuzzy (struct rspamd_config *cfg);
  78. void start_fuzzy (struct rspamd_worker *worker);
  79. worker_t fuzzy_worker = {
  80. "fuzzy", /* Name */
  81. init_fuzzy, /* Init function */
  82. start_fuzzy, /* Start function */
  83. RSPAMD_WORKER_HAS_SOCKET,
  84. RSPAMD_WORKER_SOCKET_UDP|RSPAMD_WORKER_SOCKET_TCP, /* Both socket */
  85. RSPAMD_WORKER_VER /* Version info */
  86. };
  87. struct fuzzy_global_stat {
  88. guint64 fuzzy_hashes;
  89. /**< number of fuzzy hashes stored */
  90. guint64 fuzzy_hashes_expired;
  91. /**< number of fuzzy hashes expired */
  92. guint64 fuzzy_hashes_checked[RSPAMD_FUZZY_EPOCH_MAX];
  93. /**< amount of check requests for each epoch */
  94. guint64 fuzzy_shingles_checked[RSPAMD_FUZZY_EPOCH_MAX];
  95. /**< amount of shingle check requests for each epoch */
  96. guint64 fuzzy_hashes_found[RSPAMD_FUZZY_EPOCH_MAX];
  97. /**< amount of hashes found by epoch */
  98. guint64 invalid_requests;
  99. };
  100. struct fuzzy_key_stat {
  101. guint64 checked;
  102. guint64 matched;
  103. guint64 added;
  104. guint64 deleted;
  105. guint64 errors;
  106. rspamd_lru_hash_t *last_ips;
  107. };
  108. struct rspamd_fuzzy_mirror {
  109. gchar *name;
  110. struct upstream_list *u;
  111. struct rspamd_cryptobox_pubkey *key;
  112. };
  113. struct rspamd_leaky_bucket_elt {
  114. rspamd_inet_addr_t *addr;
  115. gdouble last;
  116. gdouble cur;
  117. };
  118. static const guint64 rspamd_fuzzy_storage_magic = 0x291a3253eb1b3ea5ULL;
  119. struct rspamd_fuzzy_storage_ctx {
  120. guint64 magic;
  121. /* Events base */
  122. struct event_base *ev_base;
  123. /* DNS resolver */
  124. struct rspamd_dns_resolver *resolver;
  125. /* Config */
  126. struct rspamd_config *cfg;
  127. /* END OF COMMON PART */
  128. struct fuzzy_global_stat stat;
  129. gdouble expire;
  130. gdouble sync_timeout;
  131. struct rspamd_radix_map_helper *update_ips;
  132. struct rspamd_radix_map_helper *master_ips;
  133. struct rspamd_radix_map_helper *blocked_ips;
  134. struct rspamd_radix_map_helper *ratelimit_whitelist;
  135. struct rspamd_cryptobox_keypair *sync_keypair;
  136. struct rspamd_cryptobox_pubkey *master_key;
  137. struct timeval master_io_tv;
  138. gdouble master_timeout;
  139. GPtrArray *mirrors;
  140. const ucl_object_t *update_map;
  141. const ucl_object_t *masters_map;
  142. const ucl_object_t *blocked_map;
  143. const ucl_object_t *ratelimit_whitelist_map;
  144. GHashTable *master_flags;
  145. guint keypair_cache_size;
  146. gint peer_fd;
  147. struct event peer_ev;
  148. struct event stat_ev;
  149. struct timeval stat_tv;
  150. /* Local keypair */
  151. struct rspamd_cryptobox_keypair *default_keypair; /* Bad clash, need for parse keypair */
  152. struct fuzzy_key *default_key;
  153. GHashTable *keys;
  154. gboolean encrypted_only;
  155. gboolean collection_mode;
  156. gboolean read_only;
  157. struct rspamd_cryptobox_keypair *collection_keypair;
  158. struct rspamd_cryptobox_pubkey *collection_sign_key;
  159. gchar *collection_id_file;
  160. struct rspamd_http_context *http_ctx;
  161. struct rspamd_keypair_cache *keypair_cache;
  162. rspamd_lru_hash_t *errors_ips;
  163. rspamd_lru_hash_t *ratelimit_buckets;
  164. struct rspamd_fuzzy_backend *backend;
  165. GArray *updates_pending;
  166. guint updates_failed;
  167. guint updates_maxfail;
  168. guint32 collection_id;
  169. /* Ratelimits */
  170. guint leaky_bucket_ttl;
  171. guint leaky_bucket_mask;
  172. guint max_buckets;
  173. gboolean ratelimit_log_only;
  174. gdouble leaky_bucket_burst;
  175. gdouble leaky_bucket_rate;
  176. struct rspamd_worker *worker;
  177. struct rspamd_http_connection_router *collection_rt;
  178. const ucl_object_t *skip_map;
  179. struct rspamd_hash_map_helper *skip_hashes;
  180. guchar cookie[COOKIE_SIZE];
  181. };
  182. enum fuzzy_cmd_type {
  183. CMD_NORMAL,
  184. CMD_SHINGLE,
  185. CMD_ENCRYPTED_NORMAL,
  186. CMD_ENCRYPTED_SHINGLE
  187. };
  188. struct fuzzy_session {
  189. struct rspamd_worker *worker;
  190. rspamd_inet_addr_t *addr;
  191. struct rspamd_fuzzy_storage_ctx *ctx;
  192. union {
  193. struct rspamd_fuzzy_encrypted_shingle_cmd enc_shingle;
  194. struct rspamd_fuzzy_encrypted_cmd enc_normal;
  195. struct rspamd_fuzzy_cmd normal;
  196. struct rspamd_fuzzy_shingle_cmd shingle;
  197. } cmd;
  198. struct rspamd_fuzzy_encrypted_reply reply;
  199. struct fuzzy_key_stat *ip_stat;
  200. enum rspamd_fuzzy_epoch epoch;
  201. enum fuzzy_cmd_type cmd_type;
  202. gint fd;
  203. guint64 time;
  204. struct event io;
  205. ref_entry_t ref;
  206. struct fuzzy_key_stat *key_stat;
  207. guchar nm[rspamd_cryptobox_MAX_NMBYTES];
  208. };
  209. struct fuzzy_peer_request {
  210. struct event io_ev;
  211. struct fuzzy_peer_cmd cmd;
  212. };
  213. struct fuzzy_key {
  214. struct rspamd_cryptobox_keypair *key;
  215. struct rspamd_cryptobox_pubkey *pk;
  216. struct fuzzy_key_stat *stat;
  217. };
  218. struct fuzzy_master_update_session {
  219. const gchar *name;
  220. gchar uid[16];
  221. struct rspamd_http_connection *conn;
  222. struct rspamd_http_message *msg;
  223. struct rspamd_fuzzy_storage_ctx *ctx;
  224. const gchar *src;
  225. gchar *psrc;
  226. rspamd_inet_addr_t *addr;
  227. gboolean replied;
  228. gint sock;
  229. };
  230. static void rspamd_fuzzy_write_reply (struct fuzzy_session *session);
  231. static gboolean
  232. rspamd_fuzzy_check_ratelimit (struct fuzzy_session *session)
  233. {
  234. rspamd_inet_addr_t *masked;
  235. struct rspamd_leaky_bucket_elt *elt;
  236. struct timeval tv;
  237. gdouble now;
  238. if (session->ctx->ratelimit_whitelist != NULL) {
  239. if (rspamd_match_radix_map_addr (session->ctx->ratelimit_whitelist,
  240. session->addr) != NULL) {
  241. return TRUE;
  242. }
  243. }
  244. /*
  245. if (rspamd_inet_address_is_local (session->addr, TRUE)) {
  246. return TRUE;
  247. }
  248. */
  249. masked = rspamd_inet_address_copy (session->addr);
  250. if (rspamd_inet_address_get_af (masked) == AF_INET) {
  251. rspamd_inet_address_apply_mask (masked,
  252. MIN (session->ctx->leaky_bucket_mask, 32));
  253. }
  254. else {
  255. /* Must be at least /64 */
  256. rspamd_inet_address_apply_mask (masked,
  257. MIN (MAX (session->ctx->leaky_bucket_mask * 4, 64), 128));
  258. }
  259. #ifdef HAVE_EVENT_NO_CACHE_TIME_FUNC
  260. event_base_gettimeofday_cached (session->ctx->ev_base, &tv);
  261. #else
  262. gettimeofday (&tv, NULL);
  263. #endif
  264. now = tv_to_double (&tv);
  265. elt = rspamd_lru_hash_lookup (session->ctx->ratelimit_buckets, masked,
  266. tv.tv_sec);
  267. if (elt) {
  268. gboolean ratelimited = FALSE;
  269. if (isnan (elt->cur)) {
  270. /* Ratelimit exceeded, preserve it for the whole ttl */
  271. ratelimited = TRUE;
  272. }
  273. else {
  274. /* Update bucket */
  275. if (elt->last < now) {
  276. elt->cur -= session->ctx->leaky_bucket_rate * (now - elt->last);
  277. elt->last = now;
  278. if (elt->cur < 0) {
  279. elt->cur = 0;
  280. }
  281. }
  282. else {
  283. elt->last = now;
  284. }
  285. /* Check bucket */
  286. if (elt->cur >= session->ctx->leaky_bucket_burst) {
  287. msg_info ("ratelimiting %s (%s), %.1f max elts",
  288. rspamd_inet_address_to_string (session->addr),
  289. rspamd_inet_address_to_string (masked),
  290. session->ctx->leaky_bucket_burst);
  291. elt->cur = NAN;
  292. }
  293. else {
  294. elt->cur ++; /* Allow one more request */
  295. }
  296. }
  297. rspamd_inet_address_free (masked);
  298. return !ratelimited;
  299. }
  300. else {
  301. /* New bucket */
  302. elt = g_malloc (sizeof (*elt));
  303. elt->addr = masked; /* transfer ownership */
  304. elt->cur = 1;
  305. elt->last = now;
  306. rspamd_lru_hash_insert (session->ctx->ratelimit_buckets,
  307. masked,
  308. elt,
  309. tv.tv_sec,
  310. session->ctx->leaky_bucket_ttl);
  311. }
  312. return TRUE;
  313. }
  314. static gboolean
  315. rspamd_fuzzy_check_client (struct fuzzy_session *session, gboolean is_write)
  316. {
  317. if (session->ctx->blocked_ips != NULL) {
  318. if (rspamd_match_radix_map_addr (session->ctx->blocked_ips,
  319. session->addr) != NULL) {
  320. return FALSE;
  321. }
  322. }
  323. if (is_write) {
  324. if (session->ctx->read_only) {
  325. return FALSE;
  326. }
  327. if (session->ctx->update_ips != NULL) {
  328. if (rspamd_match_radix_map_addr (session->ctx->update_ips,
  329. session->addr) == NULL) {
  330. return FALSE;
  331. }
  332. else {
  333. return TRUE;
  334. }
  335. }
  336. return FALSE;
  337. }
  338. /* Non write */
  339. if (session->ctx->ratelimit_buckets) {
  340. if (session->ctx->ratelimit_log_only) {
  341. (void)rspamd_fuzzy_check_ratelimit (session); /* Check but ignore */
  342. }
  343. else {
  344. return rspamd_fuzzy_check_ratelimit (session);
  345. }
  346. }
  347. return TRUE;
  348. }
  349. static void
  350. fuzzy_key_stat_dtor (gpointer p)
  351. {
  352. struct fuzzy_key_stat *st = p;
  353. if (st->last_ips) {
  354. rspamd_lru_hash_destroy (st->last_ips);
  355. }
  356. }
  357. static void
  358. fuzzy_key_dtor (gpointer p)
  359. {
  360. struct fuzzy_key *key = p;
  361. if (key->stat) {
  362. fuzzy_key_stat_dtor (key->stat);
  363. }
  364. }
  365. static void
  366. fuzzy_count_callback (guint64 count, void *ud)
  367. {
  368. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  369. ctx->stat.fuzzy_hashes = count;
  370. }
  371. struct fuzzy_slave_connection {
  372. struct rspamd_cryptobox_keypair *local_key;
  373. struct rspamd_cryptobox_pubkey *remote_key;
  374. struct upstream *up;
  375. struct rspamd_http_connection *http_conn;
  376. struct rspamd_fuzzy_mirror *mirror;
  377. gint sock;
  378. };
  379. static void
  380. fuzzy_rl_bucket_free (gpointer p)
  381. {
  382. struct rspamd_leaky_bucket_elt *elt = (struct rspamd_leaky_bucket_elt *)p;
  383. rspamd_inet_address_free (elt->addr);
  384. g_free (elt);
  385. }
  386. static void
  387. fuzzy_mirror_close_connection (struct fuzzy_slave_connection *conn)
  388. {
  389. if (conn) {
  390. if (conn->http_conn) {
  391. rspamd_http_connection_reset (conn->http_conn);
  392. rspamd_http_connection_unref (conn->http_conn);
  393. }
  394. close (conn->sock);
  395. g_free (conn);
  396. }
  397. }
  398. struct rspamd_fuzzy_updates_cbdata {
  399. struct rspamd_fuzzy_storage_ctx *ctx;
  400. struct rspamd_http_message *msg;
  401. struct fuzzy_slave_connection *conn;
  402. struct rspamd_fuzzy_mirror *m;
  403. GArray *updates_pending;
  404. };
  405. static void
  406. fuzzy_mirror_updates_version_cb (guint64 rev64, void *ud)
  407. {
  408. struct rspamd_fuzzy_updates_cbdata *cbdata = ud;
  409. struct fuzzy_peer_cmd *io_cmd;
  410. guint32 rev32 = rev64, len;
  411. const gchar *p;
  412. rspamd_fstring_t *reply;
  413. struct fuzzy_slave_connection *conn;
  414. struct rspamd_fuzzy_storage_ctx *ctx;
  415. struct rspamd_http_message *msg;
  416. struct rspamd_fuzzy_mirror *m;
  417. struct timeval tv;
  418. guint i;
  419. conn = cbdata->conn;
  420. ctx = cbdata->ctx;
  421. msg = cbdata->msg;
  422. m = cbdata->m;
  423. rev32 = GUINT32_TO_LE (rev32);
  424. len = sizeof (guint32) * 2; /* revision + last chunk */
  425. for (i = 0; i < cbdata->updates_pending->len; i ++) {
  426. io_cmd = &g_array_index (cbdata->updates_pending,
  427. struct fuzzy_peer_cmd, i);
  428. if (io_cmd->is_shingle) {
  429. len += sizeof (guint32) + sizeof (guint32) +
  430. sizeof (struct rspamd_fuzzy_shingle_cmd);
  431. }
  432. else {
  433. len += sizeof (guint32) + sizeof (guint32) +
  434. sizeof (struct rspamd_fuzzy_cmd);
  435. }
  436. }
  437. reply = rspamd_fstring_sized_new (len);
  438. reply = rspamd_fstring_append (reply, (const char *)&rev32,
  439. sizeof (rev32));
  440. for (i = 0; i < cbdata->updates_pending->len; i ++) {
  441. io_cmd = &g_array_index (cbdata->updates_pending, struct fuzzy_peer_cmd, i);
  442. if (io_cmd->is_shingle) {
  443. len = sizeof (guint32) +
  444. sizeof (struct rspamd_fuzzy_shingle_cmd);
  445. }
  446. else {
  447. len = sizeof (guint32) +
  448. sizeof (struct rspamd_fuzzy_cmd);
  449. }
  450. p = (const char *)io_cmd;
  451. len = GUINT32_TO_LE (len);
  452. reply = rspamd_fstring_append (reply, (const char *)&len, sizeof (len));
  453. reply = rspamd_fstring_append (reply, p, len);
  454. }
  455. /* Last chunk */
  456. len = 0;
  457. reply = rspamd_fstring_append (reply, (const char *)&len, sizeof (len));
  458. rspamd_http_message_set_body_from_fstring_steal (msg, reply);
  459. double_to_tv (ctx->sync_timeout, &tv);
  460. rspamd_http_connection_write_message (conn->http_conn,
  461. msg, NULL, NULL, conn,
  462. &tv);
  463. msg_info ("send update request to %s", m->name);
  464. g_array_free (cbdata->updates_pending, TRUE);
  465. g_free (cbdata);
  466. }
  467. static void
  468. fuzzy_mirror_updates_to_http (struct rspamd_fuzzy_mirror *m,
  469. struct fuzzy_slave_connection *conn,
  470. struct rspamd_fuzzy_storage_ctx *ctx,
  471. struct rspamd_http_message *msg,
  472. GArray *updates)
  473. {
  474. struct rspamd_fuzzy_updates_cbdata *cbdata;
  475. cbdata = g_malloc (sizeof (*cbdata));
  476. cbdata->ctx = ctx;
  477. cbdata->msg = msg;
  478. cbdata->conn = conn;
  479. cbdata->m = m;
  480. /* Copy queue */
  481. cbdata->updates_pending = g_array_sized_new (FALSE, FALSE,
  482. sizeof (struct fuzzy_peer_cmd), updates->len);
  483. g_array_append_vals (cbdata->updates_pending, updates->data, updates->len);
  484. rspamd_fuzzy_backend_version (ctx->backend, local_db_name,
  485. fuzzy_mirror_updates_version_cb, cbdata);
  486. }
  487. static void
  488. fuzzy_mirror_error_handler (struct rspamd_http_connection *conn, GError *err)
  489. {
  490. struct fuzzy_slave_connection *bk_conn = conn->ud;
  491. msg_info ("abnormally closing connection from backend: %s:%s, "
  492. "error: %e",
  493. bk_conn->mirror->name,
  494. rspamd_inet_address_to_string (rspamd_upstream_addr_cur (bk_conn->up)),
  495. err);
  496. fuzzy_mirror_close_connection (bk_conn);
  497. }
  498. static gint
  499. fuzzy_mirror_finish_handler (struct rspamd_http_connection *conn,
  500. struct rspamd_http_message *msg)
  501. {
  502. struct fuzzy_slave_connection *bk_conn = conn->ud;
  503. msg_info ("finished mirror connection to %s", bk_conn->mirror->name);
  504. fuzzy_mirror_close_connection (bk_conn);
  505. return 0;
  506. }
  507. static void
  508. rspamd_fuzzy_send_update_mirror (struct rspamd_fuzzy_storage_ctx *ctx,
  509. struct rspamd_fuzzy_mirror *m, GArray *updates)
  510. {
  511. struct fuzzy_slave_connection *conn;
  512. struct rspamd_http_message *msg;
  513. conn = g_malloc0 (sizeof (*conn));
  514. conn->up = rspamd_upstream_get (m->u,
  515. RSPAMD_UPSTREAM_MASTER_SLAVE, NULL, 0);
  516. conn->mirror = m;
  517. if (conn->up == NULL) {
  518. g_free (conn);
  519. msg_err ("cannot select upstream for %s", m->name);
  520. return;
  521. }
  522. conn->sock = rspamd_inet_address_connect (
  523. rspamd_upstream_addr_next (conn->up),
  524. SOCK_STREAM, TRUE);
  525. if (conn->sock == -1) {
  526. g_free (conn);
  527. msg_err ("cannot connect upstream for %s", m->name);
  528. rspamd_upstream_fail (conn->up, TRUE);
  529. return;
  530. }
  531. msg = rspamd_http_new_message (HTTP_REQUEST);
  532. rspamd_printf_fstring (&msg->url, "/update_v1/%s", m->name);
  533. conn->http_conn = rspamd_http_connection_new (
  534. ctx->http_ctx,
  535. conn->sock,
  536. NULL,
  537. fuzzy_mirror_error_handler,
  538. fuzzy_mirror_finish_handler,
  539. RSPAMD_HTTP_CLIENT_SIMPLE,
  540. RSPAMD_HTTP_CLIENT);
  541. rspamd_http_connection_set_key (conn->http_conn,
  542. ctx->sync_keypair);
  543. msg->peer_key = rspamd_pubkey_ref (m->key);
  544. fuzzy_mirror_updates_to_http (m, conn, ctx, msg, updates);
  545. }
  546. struct rspamd_updates_cbdata {
  547. GArray *updates_pending;
  548. struct rspamd_fuzzy_storage_ctx *ctx;
  549. gchar *source;
  550. };
  551. static void
  552. fuzzy_update_version_callback (guint64 ver, void *ud)
  553. {
  554. msg_info ("updated fuzzy storage from %s: version: %d",
  555. (const char *)ud, (gint)ver);
  556. g_free (ud);
  557. }
  558. static void
  559. fuzzy_stat_count_callback (guint64 count, void *ud)
  560. {
  561. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  562. event_add (&ctx->stat_ev, &ctx->stat_tv);
  563. ctx->stat.fuzzy_hashes = count;
  564. }
  565. static void
  566. rspamd_fuzzy_stat_callback (gint fd, gshort what, gpointer ud)
  567. {
  568. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  569. event_del (&ctx->stat_ev);
  570. rspamd_fuzzy_backend_count (ctx->backend, fuzzy_stat_count_callback, ctx);
  571. }
  572. static void
  573. rspamd_fuzzy_updates_cb (gboolean success,
  574. guint nadded,
  575. guint ndeleted,
  576. guint nextended,
  577. guint nignored,
  578. void *ud)
  579. {
  580. struct rspamd_updates_cbdata *cbdata = ud;
  581. struct rspamd_fuzzy_mirror *m;
  582. guint i;
  583. struct rspamd_fuzzy_storage_ctx *ctx;
  584. const gchar *source;
  585. ctx = cbdata->ctx;
  586. source = cbdata->source;
  587. if (success) {
  588. rspamd_fuzzy_backend_count (ctx->backend, fuzzy_count_callback, ctx);
  589. if (ctx->updates_pending->len > 0) {
  590. for (i = 0; i < ctx->mirrors->len; i ++) {
  591. m = g_ptr_array_index (ctx->mirrors, i);
  592. rspamd_fuzzy_send_update_mirror (ctx, m,
  593. cbdata->updates_pending);
  594. }
  595. }
  596. msg_info ("successfully updated fuzzy storage: %d updates in queue; "
  597. "%d pending currently; "
  598. "%d added, %d deleted, %d extended, %d duplicates",
  599. cbdata->updates_pending->len,
  600. ctx->updates_pending->len,
  601. nadded, ndeleted, nextended, nignored);
  602. rspamd_fuzzy_backend_version (ctx->backend, source,
  603. fuzzy_update_version_callback, g_strdup (source));
  604. ctx->updates_failed = 0;
  605. }
  606. else {
  607. if (++ctx->updates_failed > ctx->updates_maxfail) {
  608. msg_err ("cannot commit update transaction to fuzzy backend, discard "
  609. "%ud updates after %d retries",
  610. cbdata->updates_pending->len,
  611. ctx->updates_maxfail);
  612. ctx->updates_failed = 0;
  613. }
  614. else {
  615. msg_err ("cannot commit update transaction to fuzzy backend, "
  616. "%ud updates are still left; %ud currently pending;"
  617. " %d updates left",
  618. cbdata->updates_pending->len,
  619. ctx->updates_pending->len,
  620. ctx->updates_maxfail - ctx->updates_failed);
  621. /* Move the remaining updates to ctx queue */
  622. g_array_append_vals (ctx->updates_pending,
  623. cbdata->updates_pending->data,
  624. cbdata->updates_pending->len);
  625. }
  626. }
  627. if (ctx->worker->wanna_die) {
  628. /* Plan exit */
  629. struct timeval tv;
  630. tv.tv_sec = 0;
  631. tv.tv_usec = 0;
  632. event_base_loopexit (ctx->ev_base, &tv);
  633. }
  634. g_array_free (cbdata->updates_pending, TRUE);
  635. g_free (cbdata->source);
  636. g_free (cbdata);
  637. }
  638. static void
  639. rspamd_fuzzy_process_updates_queue (struct rspamd_fuzzy_storage_ctx *ctx,
  640. const gchar *source, gboolean forced)
  641. {
  642. struct rspamd_updates_cbdata *cbdata;
  643. if ((forced ||ctx->updates_pending->len > 0)) {
  644. cbdata = g_malloc (sizeof (*cbdata));
  645. cbdata->ctx = ctx;
  646. cbdata->updates_pending = ctx->updates_pending;
  647. ctx->updates_pending = g_array_sized_new (FALSE, FALSE,
  648. sizeof (struct fuzzy_peer_cmd),
  649. MAX (cbdata->updates_pending->len, 1024));
  650. cbdata->source = g_strdup (source);
  651. rspamd_fuzzy_backend_process_updates (ctx->backend,
  652. cbdata->updates_pending,
  653. source, rspamd_fuzzy_updates_cb, cbdata);
  654. }
  655. }
  656. static void
  657. rspamd_fuzzy_reply_io (gint fd, gshort what, gpointer d)
  658. {
  659. struct fuzzy_session *session = d;
  660. rspamd_fuzzy_write_reply (session);
  661. REF_RELEASE (session);
  662. }
  663. static void
  664. rspamd_fuzzy_write_reply (struct fuzzy_session *session)
  665. {
  666. gssize r;
  667. gsize len;
  668. gconstpointer data;
  669. if (session->cmd_type == CMD_ENCRYPTED_NORMAL ||
  670. session->cmd_type == CMD_ENCRYPTED_SHINGLE) {
  671. /* Encrypted reply */
  672. data = &session->reply;
  673. if (session->epoch > RSPAMD_FUZZY_EPOCH10) {
  674. len = sizeof (session->reply);
  675. }
  676. else {
  677. len = sizeof (session->reply.hdr) + sizeof (session->reply.rep.v1);
  678. }
  679. }
  680. else {
  681. data = &session->reply.rep;
  682. if (session->epoch > RSPAMD_FUZZY_EPOCH10) {
  683. len = sizeof (session->reply.rep);
  684. }
  685. else {
  686. len = sizeof (session->reply.rep.v1);
  687. }
  688. }
  689. r = rspamd_inet_address_sendto (session->fd, data, len, 0,
  690. session->addr);
  691. if (r == -1) {
  692. if (errno == EINTR || errno == EWOULDBLOCK || errno == EAGAIN) {
  693. /* Grab reference to avoid early destruction */
  694. REF_RETAIN (session);
  695. event_set (&session->io, session->fd, EV_WRITE,
  696. rspamd_fuzzy_reply_io, session);
  697. event_base_set (session->ctx->ev_base, &session->io);
  698. event_add (&session->io, NULL);
  699. }
  700. else {
  701. msg_err ("error while writing reply: %s", strerror (errno));
  702. }
  703. }
  704. }
  705. static void
  706. fuzzy_peer_send_io (gint fd, gshort what, gpointer d)
  707. {
  708. struct fuzzy_peer_request *up_req = d;
  709. gssize r;
  710. r = write (fd, &up_req->cmd, sizeof (up_req->cmd));
  711. if (r != sizeof (up_req->cmd)) {
  712. msg_err ("cannot send update request to the peer: %s", strerror (errno));
  713. }
  714. event_del (&up_req->io_ev);
  715. g_free (up_req);
  716. }
  717. static void
  718. rspamd_fuzzy_update_stats (struct rspamd_fuzzy_storage_ctx *ctx,
  719. enum rspamd_fuzzy_epoch epoch,
  720. gboolean matched,
  721. gboolean is_shingle,
  722. struct fuzzy_key_stat *key_stat,
  723. struct fuzzy_key_stat *ip_stat,
  724. guint cmd, guint reply)
  725. {
  726. ctx->stat.fuzzy_hashes_checked[epoch] ++;
  727. if (matched) {
  728. ctx->stat.fuzzy_hashes_found[epoch]++;
  729. }
  730. if (is_shingle) {
  731. ctx->stat.fuzzy_shingles_checked[epoch]++;
  732. }
  733. if (key_stat) {
  734. if (!matched && reply != 0) {
  735. key_stat->errors ++;
  736. }
  737. else {
  738. if (cmd == FUZZY_CHECK) {
  739. key_stat->checked++;
  740. if (matched) {
  741. key_stat->matched ++;
  742. }
  743. }
  744. else if (cmd == FUZZY_WRITE) {
  745. key_stat->added++;
  746. }
  747. else if (cmd == FUZZY_DEL) {
  748. key_stat->deleted++;
  749. }
  750. }
  751. }
  752. if (ip_stat) {
  753. if (!matched && reply != 0) {
  754. ip_stat->errors++;
  755. }
  756. else {
  757. if (cmd == FUZZY_CHECK) {
  758. ip_stat->checked++;
  759. if (matched) {
  760. ip_stat->matched++;
  761. }
  762. }
  763. else if (cmd == FUZZY_WRITE) {
  764. ip_stat->added++;
  765. }
  766. else if (cmd == FUZZY_DEL) {
  767. ip_stat->deleted++;
  768. }
  769. }
  770. }
  771. }
  772. static void
  773. rspamd_fuzzy_make_reply (struct rspamd_fuzzy_cmd *cmd,
  774. struct rspamd_fuzzy_reply *result,
  775. struct fuzzy_session *session,
  776. gboolean encrypted, gboolean is_shingle)
  777. {
  778. gsize len;
  779. if (cmd) {
  780. result->v1.tag = cmd->tag;
  781. memcpy (&session->reply.rep, result, sizeof (*result));
  782. rspamd_fuzzy_update_stats (session->ctx,
  783. session->epoch,
  784. result->v1.prob > 0.5,
  785. is_shingle,
  786. session->key_stat,
  787. session->ip_stat,
  788. cmd->cmd,
  789. result->v1.value);
  790. if (encrypted) {
  791. /* We need also to encrypt reply */
  792. ottery_rand_bytes (session->reply.hdr.nonce,
  793. sizeof (session->reply.hdr.nonce));
  794. /*
  795. * For old replies we need to encrypt just old part, otherwise
  796. * decryption would fail due to mac verification mistake
  797. */
  798. if (session->epoch > RSPAMD_FUZZY_EPOCH10) {
  799. len = sizeof (session->reply.rep);
  800. }
  801. else {
  802. len = sizeof (session->reply.rep.v1);
  803. }
  804. rspamd_cryptobox_encrypt_nm_inplace ((guchar *)&session->reply.rep,
  805. len,
  806. session->reply.hdr.nonce,
  807. session->nm,
  808. session->reply.hdr.mac,
  809. RSPAMD_CRYPTOBOX_MODE_25519);
  810. }
  811. }
  812. rspamd_fuzzy_write_reply (session);
  813. }
  814. static void
  815. rspamd_fuzzy_check_callback (struct rspamd_fuzzy_reply *result, void *ud)
  816. {
  817. struct fuzzy_session *session = ud;
  818. gboolean encrypted = FALSE, is_shingle = FALSE;
  819. struct rspamd_fuzzy_cmd *cmd = NULL;
  820. const struct rspamd_shingle *shingle = NULL;
  821. struct rspamd_shingle sgl_cpy;
  822. switch (session->cmd_type) {
  823. case CMD_NORMAL:
  824. cmd = &session->cmd.normal;
  825. break;
  826. case CMD_SHINGLE:
  827. cmd = &session->cmd.shingle.basic;
  828. memcpy (&sgl_cpy, &session->cmd.shingle.sgl, sizeof (sgl_cpy));
  829. shingle = &sgl_cpy;
  830. is_shingle = TRUE;
  831. break;
  832. case CMD_ENCRYPTED_NORMAL:
  833. cmd = &session->cmd.enc_normal.cmd;
  834. encrypted = TRUE;
  835. break;
  836. case CMD_ENCRYPTED_SHINGLE:
  837. cmd = &session->cmd.enc_shingle.cmd.basic;
  838. memcpy (&sgl_cpy, &session->cmd.enc_shingle.cmd.sgl, sizeof (sgl_cpy));
  839. shingle = &sgl_cpy;
  840. encrypted = TRUE;
  841. is_shingle = TRUE;
  842. break;
  843. }
  844. rspamd_fuzzy_make_reply (cmd, result, session, encrypted, is_shingle);
  845. /* Refresh hash if found with strong confidence */
  846. if (result->v1.prob > 0.9 && !session->ctx->read_only) {
  847. struct fuzzy_peer_cmd up_cmd;
  848. struct fuzzy_peer_request *up_req;
  849. if (session->worker->index == 0 || session->ctx->peer_fd == -1) {
  850. /* Just add to the queue */
  851. memset (&up_cmd, 0, sizeof (up_cmd));
  852. up_cmd.is_shingle = is_shingle;
  853. memcpy (up_cmd.cmd.normal.digest, result->digest,
  854. sizeof (up_cmd.cmd.normal.digest));
  855. up_cmd.cmd.normal.flag = result->v1.flag;
  856. up_cmd.cmd.normal.cmd = FUZZY_REFRESH;
  857. up_cmd.cmd.normal.shingles_count = cmd->shingles_count;
  858. if (is_shingle && shingle) {
  859. memcpy (&up_cmd.cmd.shingle.sgl, shingle,
  860. sizeof (up_cmd.cmd.shingle.sgl));
  861. }
  862. g_array_append_val (session->ctx->updates_pending, up_cmd);
  863. }
  864. else {
  865. /* We need to send request to the peer */
  866. up_req = g_malloc0 (sizeof (*up_req));
  867. up_req->cmd.is_shingle = is_shingle;
  868. memcpy (up_req->cmd.cmd.normal.digest, result->digest,
  869. sizeof (up_req->cmd.cmd.normal.digest));
  870. up_req->cmd.cmd.normal.flag = result->v1.flag;
  871. up_req->cmd.cmd.normal.cmd = FUZZY_REFRESH;
  872. up_req->cmd.cmd.normal.shingles_count = cmd->shingles_count;
  873. if (is_shingle && shingle) {
  874. memcpy (&up_req->cmd.cmd.shingle.sgl, shingle,
  875. sizeof (up_req->cmd.cmd.shingle.sgl));
  876. }
  877. event_set (&up_req->io_ev, session->ctx->peer_fd, EV_WRITE,
  878. fuzzy_peer_send_io, up_req);
  879. event_base_set (session->ctx->ev_base, &up_req->io_ev);
  880. event_add (&up_req->io_ev, NULL);
  881. }
  882. }
  883. REF_RELEASE (session);
  884. }
  885. static void
  886. rspamd_fuzzy_process_command (struct fuzzy_session *session)
  887. {
  888. gboolean encrypted = FALSE, is_shingle = FALSE;
  889. struct rspamd_fuzzy_cmd *cmd = NULL;
  890. struct rspamd_fuzzy_reply result;
  891. struct fuzzy_peer_cmd up_cmd;
  892. struct fuzzy_peer_request *up_req;
  893. struct fuzzy_key_stat *ip_stat = NULL;
  894. gchar hexbuf[rspamd_cryptobox_HASHBYTES * 2 + 1];
  895. rspamd_inet_addr_t *naddr;
  896. gpointer ptr;
  897. gsize up_len = 0;
  898. switch (session->cmd_type) {
  899. case CMD_NORMAL:
  900. cmd = &session->cmd.normal;
  901. up_len = sizeof (session->cmd.normal);
  902. break;
  903. case CMD_SHINGLE:
  904. cmd = &session->cmd.shingle.basic;
  905. up_len = sizeof (session->cmd.shingle);
  906. is_shingle = TRUE;
  907. break;
  908. case CMD_ENCRYPTED_NORMAL:
  909. cmd = &session->cmd.enc_normal.cmd;
  910. up_len = sizeof (session->cmd.normal);
  911. encrypted = TRUE;
  912. break;
  913. case CMD_ENCRYPTED_SHINGLE:
  914. cmd = &session->cmd.enc_shingle.cmd.basic;
  915. up_len = sizeof (session->cmd.shingle);
  916. encrypted = TRUE;
  917. is_shingle = TRUE;
  918. break;
  919. default:
  920. msg_err ("invalid command type: %d", session->cmd_type);
  921. return;
  922. }
  923. memset (&result, 0, sizeof (result));
  924. memcpy (result.digest, cmd->digest, sizeof (result.digest));
  925. result.v1.flag = cmd->flag;
  926. result.v1.tag = cmd->tag;
  927. if (G_UNLIKELY (cmd == NULL || up_len == 0)) {
  928. result.v1.value = 500;
  929. result.v1.prob = 0.0;
  930. rspamd_fuzzy_make_reply (cmd, &result, session, encrypted, is_shingle);
  931. return;
  932. }
  933. if (session->ctx->encrypted_only && !encrypted) {
  934. /* Do not accept unencrypted commands */
  935. result.v1.value = 403;
  936. result.v1.prob = 0.0;
  937. rspamd_fuzzy_make_reply (cmd, &result, session, encrypted, is_shingle);
  938. return;
  939. }
  940. if (session->key_stat) {
  941. ip_stat = rspamd_lru_hash_lookup (session->key_stat->last_ips,
  942. session->addr, -1);
  943. if (ip_stat == NULL) {
  944. naddr = rspamd_inet_address_copy (session->addr);
  945. ip_stat = g_malloc0 (sizeof (*ip_stat));
  946. rspamd_lru_hash_insert (session->key_stat->last_ips,
  947. naddr, ip_stat, -1, 0);
  948. }
  949. session->ip_stat = ip_stat;
  950. }
  951. if (cmd->cmd == FUZZY_CHECK) {
  952. if (rspamd_fuzzy_check_client (session, FALSE)) {
  953. if (G_UNLIKELY (session->ctx->collection_mode)) {
  954. result.v1.prob = 0;
  955. result.v1.value = 500;
  956. result.v1.flag = 0;
  957. rspamd_fuzzy_make_reply (cmd, &result, session, encrypted,
  958. is_shingle);
  959. } else {
  960. REF_RETAIN (session);
  961. rspamd_fuzzy_backend_check (session->ctx->backend, cmd,
  962. rspamd_fuzzy_check_callback, session);
  963. }
  964. }
  965. else {
  966. result.v1.value = 403;
  967. result.v1.prob = 0.0;
  968. result.v1.flag = 0;
  969. rspamd_fuzzy_make_reply (cmd, &result, session, encrypted, is_shingle);
  970. }
  971. }
  972. else if (cmd->cmd == FUZZY_STAT) {
  973. if (G_UNLIKELY (session->ctx->collection_mode)) {
  974. result.v1.prob = 0;
  975. result.v1.value = 500;
  976. result.v1.flag = 0;
  977. rspamd_fuzzy_make_reply (cmd, &result, session, encrypted, is_shingle);
  978. }
  979. else {
  980. result.v1.prob = 1.0;
  981. result.v1.value = 0;
  982. result.v1.flag = session->ctx->stat.fuzzy_hashes;
  983. rspamd_fuzzy_make_reply (cmd, &result, session, encrypted, is_shingle);
  984. }
  985. }
  986. else {
  987. if (rspamd_fuzzy_check_client (session, TRUE)) {
  988. /* Check whitelist */
  989. if (session->ctx->skip_hashes && cmd->cmd == FUZZY_WRITE) {
  990. rspamd_encode_hex_buf (cmd->digest, sizeof (cmd->digest),
  991. hexbuf, sizeof (hexbuf) - 1);
  992. hexbuf[sizeof (hexbuf) - 1] = '\0';
  993. if (rspamd_match_hash_map (session->ctx->skip_hashes, hexbuf)) {
  994. result.v1.value = 401;
  995. result.v1.prob = 0.0;
  996. goto reply;
  997. }
  998. }
  999. if (session->worker->index == 0 || session->ctx->peer_fd == -1) {
  1000. /* Just add to the queue */
  1001. up_cmd.is_shingle = is_shingle;
  1002. ptr = is_shingle ?
  1003. (gpointer)&up_cmd.cmd.shingle :
  1004. (gpointer)&up_cmd.cmd.normal;
  1005. memcpy (ptr, cmd, up_len);
  1006. g_array_append_val (session->ctx->updates_pending, up_cmd);
  1007. }
  1008. else {
  1009. /* We need to send request to the peer */
  1010. up_req = g_malloc0 (sizeof (*up_req));
  1011. up_req->cmd.is_shingle = is_shingle;
  1012. ptr = is_shingle ?
  1013. (gpointer)&up_req->cmd.cmd.shingle :
  1014. (gpointer)&up_req->cmd.cmd.normal;
  1015. memcpy (ptr, cmd, up_len);
  1016. event_set (&up_req->io_ev, session->ctx->peer_fd, EV_WRITE,
  1017. fuzzy_peer_send_io, up_req);
  1018. event_base_set (session->ctx->ev_base, &up_req->io_ev);
  1019. event_add (&up_req->io_ev, NULL);
  1020. }
  1021. result.v1.value = 0;
  1022. result.v1.prob = 1.0;
  1023. }
  1024. else {
  1025. result.v1.value = 403;
  1026. result.v1.prob = 0.0;
  1027. }
  1028. reply:
  1029. rspamd_fuzzy_make_reply (cmd, &result, session, encrypted, is_shingle);
  1030. }
  1031. }
  1032. static enum rspamd_fuzzy_epoch
  1033. rspamd_fuzzy_command_valid (struct rspamd_fuzzy_cmd *cmd, gint r)
  1034. {
  1035. enum rspamd_fuzzy_epoch ret = RSPAMD_FUZZY_EPOCH_MAX;
  1036. switch (cmd->version) {
  1037. case 4:
  1038. if (cmd->shingles_count > 0) {
  1039. if (r == sizeof (struct rspamd_fuzzy_shingle_cmd)) {
  1040. ret = RSPAMD_FUZZY_EPOCH11;
  1041. }
  1042. }
  1043. else {
  1044. if (r == sizeof (*cmd)) {
  1045. ret = RSPAMD_FUZZY_EPOCH11;
  1046. }
  1047. }
  1048. break;
  1049. case 3:
  1050. if (cmd->shingles_count > 0) {
  1051. if (r == sizeof (struct rspamd_fuzzy_shingle_cmd)) {
  1052. ret = RSPAMD_FUZZY_EPOCH10;
  1053. }
  1054. }
  1055. else {
  1056. if (r == sizeof (*cmd)) {
  1057. ret = RSPAMD_FUZZY_EPOCH10;
  1058. }
  1059. }
  1060. break;
  1061. case 2:
  1062. /*
  1063. * rspamd 0.8 has slightly different tokenizer then it might be not
  1064. * 100% compatible
  1065. */
  1066. if (cmd->shingles_count > 0) {
  1067. if (r == sizeof (struct rspamd_fuzzy_shingle_cmd)) {
  1068. ret = RSPAMD_FUZZY_EPOCH8;
  1069. }
  1070. }
  1071. else {
  1072. ret = RSPAMD_FUZZY_EPOCH8;
  1073. }
  1074. break;
  1075. default:
  1076. break;
  1077. }
  1078. return ret;
  1079. }
  1080. static gboolean
  1081. rspamd_fuzzy_decrypt_command (struct fuzzy_session *s)
  1082. {
  1083. struct rspamd_fuzzy_encrypted_req_hdr *hdr;
  1084. guchar *payload;
  1085. gsize payload_len;
  1086. struct rspamd_cryptobox_pubkey *rk;
  1087. struct fuzzy_key *key;
  1088. if (s->ctx->default_key == NULL) {
  1089. msg_warn ("received encrypted request when encryption is not enabled");
  1090. return FALSE;
  1091. }
  1092. if (s->cmd_type == CMD_ENCRYPTED_NORMAL) {
  1093. hdr = &s->cmd.enc_normal.hdr;
  1094. payload = (guchar *)&s->cmd.enc_normal.cmd;
  1095. payload_len = sizeof (s->cmd.enc_normal.cmd);
  1096. }
  1097. else {
  1098. hdr = &s->cmd.enc_shingle.hdr;
  1099. payload = (guchar *) &s->cmd.enc_shingle.cmd;
  1100. payload_len = sizeof (s->cmd.enc_shingle.cmd);
  1101. }
  1102. /* Compare magic */
  1103. if (memcmp (hdr->magic, fuzzy_encrypted_magic, sizeof (hdr->magic)) != 0) {
  1104. msg_debug ("invalid magic for the encrypted packet");
  1105. return FALSE;
  1106. }
  1107. /* Try to find the desired key */
  1108. key = g_hash_table_lookup (s->ctx->keys, hdr->key_id);
  1109. if (key == NULL) {
  1110. /* Unknown key, assume default one */
  1111. key = s->ctx->default_key;
  1112. }
  1113. s->key_stat = key->stat;
  1114. /* Now process keypair */
  1115. rk = rspamd_pubkey_from_bin (hdr->pubkey, sizeof (hdr->pubkey),
  1116. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  1117. if (rk == NULL) {
  1118. msg_err ("bad key");
  1119. return FALSE;
  1120. }
  1121. rspamd_keypair_cache_process (s->ctx->keypair_cache, key->key, rk);
  1122. /* Now decrypt request */
  1123. if (!rspamd_cryptobox_decrypt_nm_inplace (payload, payload_len, hdr->nonce,
  1124. rspamd_pubkey_get_nm (rk, key->key),
  1125. hdr->mac, RSPAMD_CRYPTOBOX_MODE_25519)) {
  1126. msg_err ("decryption failed");
  1127. rspamd_pubkey_unref (rk);
  1128. return FALSE;
  1129. }
  1130. memcpy (s->nm, rspamd_pubkey_get_nm (rk, key->key), sizeof (s->nm));
  1131. rspamd_pubkey_unref (rk);
  1132. return TRUE;
  1133. }
  1134. static gboolean
  1135. rspamd_fuzzy_cmd_from_wire (guchar *buf, guint buflen, struct fuzzy_session *s)
  1136. {
  1137. enum rspamd_fuzzy_epoch epoch;
  1138. /* For now, we assume that recvfrom returns a complete datagramm */
  1139. switch (buflen) {
  1140. case sizeof (struct rspamd_fuzzy_cmd):
  1141. s->cmd_type = CMD_NORMAL;
  1142. memcpy (&s->cmd.normal, buf, sizeof (s->cmd.normal));
  1143. epoch = rspamd_fuzzy_command_valid (&s->cmd.normal, buflen);
  1144. if (epoch == RSPAMD_FUZZY_EPOCH_MAX) {
  1145. msg_debug ("invalid fuzzy command of size %d received", buflen);
  1146. return FALSE;
  1147. }
  1148. s->epoch = epoch;
  1149. break;
  1150. case sizeof (struct rspamd_fuzzy_shingle_cmd):
  1151. s->cmd_type = CMD_SHINGLE;
  1152. memcpy (&s->cmd.shingle, buf, sizeof (s->cmd.shingle));
  1153. epoch = rspamd_fuzzy_command_valid (&s->cmd.shingle.basic, buflen);
  1154. if (epoch == RSPAMD_FUZZY_EPOCH_MAX) {
  1155. msg_debug ("invalid fuzzy command of size %d received", buflen);
  1156. return FALSE;
  1157. }
  1158. s->epoch = epoch;
  1159. break;
  1160. case sizeof (struct rspamd_fuzzy_encrypted_cmd):
  1161. s->cmd_type = CMD_ENCRYPTED_NORMAL;
  1162. memcpy (&s->cmd.enc_normal, buf, sizeof (s->cmd.enc_normal));
  1163. if (!rspamd_fuzzy_decrypt_command (s)) {
  1164. return FALSE;
  1165. }
  1166. epoch = rspamd_fuzzy_command_valid (&s->cmd.enc_normal.cmd,
  1167. sizeof (s->cmd.enc_normal.cmd));
  1168. if (epoch == RSPAMD_FUZZY_EPOCH_MAX) {
  1169. msg_debug ("invalid fuzzy command of size %d received", buflen);
  1170. return FALSE;
  1171. }
  1172. /* Encrypted is epoch 10 at least */
  1173. s->epoch = epoch;
  1174. break;
  1175. case sizeof (struct rspamd_fuzzy_encrypted_shingle_cmd):
  1176. s->cmd_type = CMD_ENCRYPTED_SHINGLE;
  1177. memcpy (&s->cmd.enc_shingle, buf, sizeof (s->cmd.enc_shingle));
  1178. if (!rspamd_fuzzy_decrypt_command (s)) {
  1179. return FALSE;
  1180. }
  1181. epoch = rspamd_fuzzy_command_valid (&s->cmd.enc_shingle.cmd.basic,
  1182. sizeof (s->cmd.enc_shingle.cmd));
  1183. if (epoch == RSPAMD_FUZZY_EPOCH_MAX) {
  1184. msg_debug ("invalid fuzzy command of size %d received", buflen);
  1185. return FALSE;
  1186. }
  1187. s->epoch = epoch;
  1188. break;
  1189. default:
  1190. msg_debug ("invalid fuzzy command of size %d received", buflen);
  1191. return FALSE;
  1192. }
  1193. return TRUE;
  1194. }
  1195. static void
  1196. rspamd_fuzzy_mirror_process_update (struct fuzzy_master_update_session *session,
  1197. struct rspamd_http_message *msg, guint our_rev)
  1198. {
  1199. const guchar *p;
  1200. gsize remain;
  1201. gint32 revision;
  1202. guint32 len = 0, cnt = 0;
  1203. struct fuzzy_peer_cmd cmd;
  1204. enum {
  1205. read_len = 0,
  1206. read_data,
  1207. finish_processing
  1208. } state = read_len;
  1209. gpointer flag_ptr;
  1210. /*
  1211. * Message format:
  1212. * <uint32_le> - revision
  1213. * <uint32_le> - size of the next element
  1214. * <data> - command data
  1215. * ...
  1216. * <0> - end of data
  1217. * ... - ignored
  1218. */
  1219. p = rspamd_http_message_get_body (msg, &remain);
  1220. if (p && remain >= sizeof (gint32) * 2) {
  1221. memcpy (&revision, p, sizeof (gint32));
  1222. revision = GINT32_TO_LE (revision);
  1223. if (revision <= our_rev) {
  1224. msg_err_fuzzy_update ("remote revision: %d is older than ours: %d, "
  1225. "refusing update",
  1226. revision, our_rev);
  1227. return;
  1228. }
  1229. else if (revision - our_rev > 1) {
  1230. msg_warn_fuzzy_update ("remote revision: %d is newer more than one revision "
  1231. "than ours: %d, cold sync is recommended",
  1232. revision, our_rev);
  1233. }
  1234. remain -= sizeof (gint32);
  1235. p += sizeof (gint32);
  1236. }
  1237. else {
  1238. msg_err_fuzzy_update ("short update message, not processing");
  1239. goto err;
  1240. }
  1241. while (remain > 0) {
  1242. switch (state) {
  1243. case read_len:
  1244. if (remain < sizeof (guint32)) {
  1245. msg_err_fuzzy_update ("short update message while reading "
  1246. "length, not processing");
  1247. goto err;
  1248. }
  1249. memcpy (&len, p, sizeof (guint32));
  1250. len = GUINT32_TO_LE (len);
  1251. remain -= sizeof (guint32);
  1252. p += sizeof (guint32);
  1253. if (len == 0) {
  1254. remain = 0;
  1255. state = finish_processing;
  1256. }
  1257. else {
  1258. state = read_data;
  1259. }
  1260. break;
  1261. case read_data:
  1262. if (remain < len) {
  1263. msg_err_fuzzy_update ("short update message while reading data, "
  1264. "not processing"
  1265. " (%zd is available, %d is required)", remain, len);
  1266. return;
  1267. }
  1268. if (len < sizeof (struct rspamd_fuzzy_cmd) + sizeof (guint32) ||
  1269. len > sizeof (cmd)) {
  1270. /* Bad size command */
  1271. msg_err_fuzzy_update ("incorrect element size: %d, at least "
  1272. "%d expected", len,
  1273. (gint)(sizeof (struct rspamd_fuzzy_cmd) + sizeof (guint32)));
  1274. goto err;
  1275. }
  1276. memcpy (&cmd, p, len);
  1277. if (cmd.is_shingle && len != sizeof (cmd)) {
  1278. /* Short command */
  1279. msg_err_fuzzy_update ("incorrect element size: %d, at least "
  1280. "%d expected", len,
  1281. (gint)(sizeof (cmd)));
  1282. goto err;
  1283. }
  1284. if (cmd.is_shingle) {
  1285. if ((flag_ptr = g_hash_table_lookup (session->ctx->master_flags,
  1286. GUINT_TO_POINTER (cmd.cmd.shingle.basic.flag))) != NULL) {
  1287. cmd.cmd.shingle.basic.flag = GPOINTER_TO_UINT (flag_ptr);
  1288. }
  1289. }
  1290. else {
  1291. if ((flag_ptr = g_hash_table_lookup (session->ctx->master_flags,
  1292. GUINT_TO_POINTER (cmd.cmd.normal.flag))) != NULL) {
  1293. cmd.cmd.normal.flag = GPOINTER_TO_UINT (flag_ptr);
  1294. }
  1295. }
  1296. g_array_append_val (session->ctx->updates_pending, cmd);
  1297. p += len;
  1298. remain -= len;
  1299. len = 0;
  1300. state = read_len;
  1301. cnt ++;
  1302. break;
  1303. case finish_processing:
  1304. /* Do nothing */
  1305. remain = 0;
  1306. break;
  1307. }
  1308. }
  1309. rspamd_fuzzy_process_updates_queue (session->ctx, session->src, TRUE);
  1310. msg_info_fuzzy_update ("processed updates from the master %s, "
  1311. "%ud operations processed,"
  1312. " revision: %d (local revision: %d)",
  1313. rspamd_inet_address_to_string (session->addr),
  1314. cnt, revision, our_rev);
  1315. err:
  1316. return;
  1317. }
  1318. static void
  1319. fuzzy_session_destroy (gpointer d)
  1320. {
  1321. struct fuzzy_session *session = d;
  1322. rspamd_inet_address_free (session->addr);
  1323. rspamd_explicit_memzero (session->nm, sizeof (session->nm));
  1324. session->worker->nconns--;
  1325. g_free (session);
  1326. }
  1327. static void
  1328. rspamd_fuzzy_mirror_session_destroy (struct fuzzy_master_update_session *session)
  1329. {
  1330. if (session) {
  1331. rspamd_http_connection_reset (session->conn);
  1332. rspamd_http_connection_unref (session->conn);
  1333. rspamd_inet_address_free (session->addr);
  1334. close (session->sock);
  1335. if (session->psrc) {
  1336. g_free (session->psrc);
  1337. }
  1338. g_free (session);
  1339. }
  1340. }
  1341. static void
  1342. rspamd_fuzzy_mirror_error_handler (struct rspamd_http_connection *conn, GError *err)
  1343. {
  1344. struct fuzzy_master_update_session *session = conn->ud;
  1345. msg_err_fuzzy_update ("abnormally closing connection from: %s, error: %e",
  1346. rspamd_inet_address_to_string (session->addr), err);
  1347. /* Terminate session immediately */
  1348. rspamd_fuzzy_mirror_session_destroy (session);
  1349. }
  1350. static void
  1351. rspamd_fuzzy_mirror_send_reply (struct fuzzy_master_update_session *session,
  1352. guint code, const gchar *str)
  1353. {
  1354. struct rspamd_http_message *msg;
  1355. msg = rspamd_http_new_message (HTTP_RESPONSE);
  1356. msg->url = rspamd_fstring_new_init (str, strlen (str));
  1357. msg->code = code;
  1358. session->replied = TRUE;
  1359. rspamd_http_connection_reset (session->conn);
  1360. rspamd_http_connection_write_message (session->conn, msg, NULL, "text/plain",
  1361. session, &session->ctx->master_io_tv);
  1362. }
  1363. static void
  1364. rspamd_fuzzy_update_version_callback (guint64 version, void *ud)
  1365. {
  1366. struct fuzzy_master_update_session *session = ud;
  1367. rspamd_fuzzy_mirror_process_update (session, session->msg, version);
  1368. rspamd_fuzzy_mirror_send_reply (session, 200, "OK");
  1369. }
  1370. static gint
  1371. rspamd_fuzzy_mirror_finish_handler (struct rspamd_http_connection *conn,
  1372. struct rspamd_http_message *msg)
  1373. {
  1374. struct fuzzy_master_update_session *session = conn->ud;
  1375. const struct rspamd_cryptobox_pubkey *rk;
  1376. const gchar *err_str = NULL;
  1377. gchar *psrc;
  1378. const gchar *src = NULL;
  1379. gsize remain;
  1380. if (session->replied) {
  1381. rspamd_fuzzy_mirror_session_destroy (session);
  1382. return 0;
  1383. }
  1384. /* Check key */
  1385. if (!rspamd_http_connection_is_encrypted (conn)) {
  1386. msg_err_fuzzy_update ("refuse unencrypted update from: %s",
  1387. rspamd_inet_address_to_string (session->addr));
  1388. err_str = "Unencrypted update is not allowed";
  1389. goto end;
  1390. }
  1391. else {
  1392. if (session->ctx->master_key) {
  1393. rk = rspamd_http_connection_get_peer_key (conn);
  1394. g_assert (rk != NULL);
  1395. if (!rspamd_pubkey_equal (rk, session->ctx->master_key)) {
  1396. msg_err_fuzzy_update ("refuse unknown pubkey update from: %s",
  1397. rspamd_inet_address_to_string (session->addr));
  1398. err_str = "Unknown pubkey";
  1399. goto end;
  1400. }
  1401. }
  1402. else {
  1403. msg_warn_fuzzy_update ("no trusted key specified, accept any update from %s",
  1404. rspamd_inet_address_to_string (session->addr));
  1405. }
  1406. if (!rspamd_http_message_get_body (msg, NULL) || !msg->url
  1407. || msg->url->len == 0) {
  1408. msg_err_fuzzy_update ("empty update message, not processing");
  1409. err_str = "Empty update";
  1410. goto end;
  1411. }
  1412. /* Detect source from url: /update_v1/<source>, so we look for the last '/' */
  1413. remain = msg->url->len;
  1414. psrc = rspamd_fstringdup (msg->url);
  1415. src = psrc;
  1416. while (remain--) {
  1417. if (src[remain] == '/') {
  1418. src = &src[remain + 1];
  1419. break;
  1420. }
  1421. }
  1422. session->src = src;
  1423. session->psrc = psrc;
  1424. session->msg = msg;
  1425. rspamd_fuzzy_backend_version (session->ctx->backend, src,
  1426. rspamd_fuzzy_update_version_callback, session);
  1427. return 0;
  1428. }
  1429. end:
  1430. rspamd_fuzzy_mirror_send_reply (session, 403, err_str);
  1431. return 0;
  1432. }
  1433. struct rspamd_fuzzy_collection_session {
  1434. struct rspamd_fuzzy_storage_ctx *ctx;
  1435. struct rspamd_worker *worker;
  1436. rspamd_inet_addr_t *from_addr;
  1437. guchar uid[16];
  1438. };
  1439. static void
  1440. rspamd_fuzzy_collection_error_handler (struct rspamd_http_connection_entry *conn_ent,
  1441. GError *err)
  1442. {
  1443. struct rspamd_fuzzy_collection_session *session = conn_ent->ud;
  1444. msg_err_fuzzy_collection ("http error occurred: %s", err->message);
  1445. }
  1446. static void
  1447. rspamd_fuzzy_collection_finish_handler (struct rspamd_http_connection_entry *conn_ent)
  1448. {
  1449. struct rspamd_fuzzy_collection_session *session = conn_ent->ud;
  1450. rspamd_inet_address_free (session->from_addr);
  1451. g_free (session);
  1452. }
  1453. void
  1454. rspamd_fuzzy_collection_send_error (struct rspamd_http_connection_entry *entry,
  1455. gint code, const gchar *error_msg, ...)
  1456. {
  1457. struct rspamd_http_message *msg;
  1458. va_list args;
  1459. rspamd_fstring_t *reply;
  1460. msg = rspamd_http_new_message (HTTP_RESPONSE);
  1461. va_start (args, error_msg);
  1462. msg->status = rspamd_fstring_new ();
  1463. rspamd_vprintf_fstring (&msg->status, error_msg, args);
  1464. va_end (args);
  1465. msg->date = time (NULL);
  1466. msg->code = code;
  1467. reply = rspamd_fstring_sized_new (msg->status->len + 16);
  1468. rspamd_printf_fstring (&reply, "%V", msg->status);
  1469. rspamd_http_message_set_body_from_fstring_steal (msg, reply);
  1470. rspamd_http_connection_reset (entry->conn);
  1471. rspamd_http_router_insert_headers (entry->rt, msg);
  1472. rspamd_http_connection_write_message (entry->conn,
  1473. msg,
  1474. NULL,
  1475. "text/plain",
  1476. entry,
  1477. entry->rt->ptv);
  1478. entry->is_reply = TRUE;
  1479. }
  1480. /*
  1481. * Note: this function steals fstring
  1482. */
  1483. void
  1484. rspamd_fuzzy_collection_send_fstring (struct rspamd_http_connection_entry *entry,
  1485. rspamd_fstring_t *fstr)
  1486. {
  1487. struct rspamd_http_message *msg;
  1488. msg = rspamd_http_new_message (HTTP_RESPONSE);
  1489. msg->status = rspamd_fstring_new_init ("OK", 2);
  1490. msg->date = time (NULL);
  1491. msg->code = 200;
  1492. rspamd_http_message_set_body_from_fstring_steal (msg, fstr);
  1493. rspamd_http_connection_reset (entry->conn);
  1494. rspamd_http_router_insert_headers (entry->rt, msg);
  1495. rspamd_http_connection_write_message (entry->conn,
  1496. msg,
  1497. NULL,
  1498. "application/octet-stream",
  1499. entry,
  1500. entry->rt->ptv);
  1501. entry->is_reply = TRUE;
  1502. }
  1503. static int
  1504. rspamd_fuzzy_collection_cookie (struct rspamd_http_connection_entry *conn_ent,
  1505. struct rspamd_http_message *msg)
  1506. {
  1507. struct rspamd_fuzzy_collection_session *session = conn_ent->ud;
  1508. rspamd_fstring_t *cookie;
  1509. cookie = rspamd_fstring_new_init (session->ctx->cookie,
  1510. sizeof (session->ctx->cookie));
  1511. rspamd_fuzzy_collection_send_fstring (conn_ent, cookie);
  1512. return 0;
  1513. }
  1514. static int
  1515. rspamd_fuzzy_collection_data (struct rspamd_http_connection_entry *conn_ent,
  1516. struct rspamd_http_message *msg)
  1517. {
  1518. struct rspamd_fuzzy_collection_session *session = conn_ent->ud;
  1519. const rspamd_ftok_t *sign_header;
  1520. struct rspamd_fuzzy_storage_ctx *ctx;
  1521. guint i;
  1522. struct fuzzy_peer_cmd *io_cmd;
  1523. rspamd_fstring_t *reply;
  1524. GError *err = NULL;
  1525. guchar *decoded_signature;
  1526. gsize dec_len;
  1527. guint32 cmdlen, nupdates = 0;
  1528. sign_header = rspamd_http_message_find_header (msg, "Signature");
  1529. if (sign_header == NULL) {
  1530. rspamd_fuzzy_collection_send_error (conn_ent, 403, "Missing signature");
  1531. return 0;
  1532. }
  1533. ctx = session->ctx;
  1534. if (ctx->collection_sign_key == NULL) {
  1535. rspamd_fuzzy_collection_send_error (conn_ent, 500, "Misconfigured signature key");
  1536. return 0;
  1537. }
  1538. decoded_signature = g_malloc (sign_header->len * 2 + 1);
  1539. dec_len = rspamd_decode_hex_buf (sign_header->begin, sign_header->len,
  1540. decoded_signature, sign_header->len * 2 + 1);
  1541. if (dec_len == -1 || !rspamd_keypair_verify (ctx->collection_sign_key,
  1542. ctx->cookie, sizeof (ctx->cookie),
  1543. decoded_signature, dec_len, &err)) {
  1544. if (err) {
  1545. rspamd_fuzzy_collection_send_error (conn_ent, 403, "Signature verification error: %e",
  1546. err);
  1547. g_error_free (err);
  1548. }
  1549. else {
  1550. rspamd_fuzzy_collection_send_error (conn_ent, 403, "Signature verification error");
  1551. }
  1552. g_free (decoded_signature);
  1553. return 0;
  1554. }
  1555. g_free (decoded_signature);
  1556. /* Generate new cookie */
  1557. ottery_rand_bytes (ctx->cookie, sizeof (ctx->cookie));
  1558. /* Send&Clear updates */
  1559. reply = rspamd_fstring_sized_new (8192);
  1560. /*
  1561. * Message format:
  1562. * <uint32_le> - revision
  1563. * <uint32_le> - size of the next element
  1564. * <data> - command data
  1565. * ...
  1566. * <0> - end of data
  1567. * ... - ignored
  1568. */
  1569. reply = rspamd_fstring_append (reply, (const gchar *)&ctx->collection_id,
  1570. sizeof (ctx->collection_id));
  1571. for (i = 0; i < ctx->updates_pending->len; i ++) {
  1572. io_cmd = &g_array_index (ctx->updates_pending, struct fuzzy_peer_cmd, i);
  1573. if (io_cmd->is_shingle) {
  1574. cmdlen = sizeof (io_cmd->cmd.shingle) + sizeof (guint32);
  1575. }
  1576. else {
  1577. cmdlen = sizeof (io_cmd->cmd.normal) + sizeof (guint32);
  1578. }
  1579. cmdlen = GUINT32_TO_LE (cmdlen);
  1580. reply = rspamd_fstring_append (reply, (const gchar *)&cmdlen,
  1581. sizeof (cmdlen));
  1582. reply = rspamd_fstring_append (reply, (const gchar *)io_cmd,
  1583. cmdlen);
  1584. nupdates ++;
  1585. }
  1586. msg_info_fuzzy_collection ("collection %d done, send %d updates",
  1587. ctx->collection_id, nupdates);
  1588. /* Last command */
  1589. cmdlen = 0;
  1590. reply = rspamd_fstring_append (reply, (const gchar *)&cmdlen,
  1591. sizeof (cmdlen));
  1592. ctx->updates_pending->len = 0;
  1593. /* Clear failed attempts counter */
  1594. ctx->updates_failed = 0;
  1595. ctx->collection_id ++;
  1596. rspamd_fuzzy_collection_send_fstring (conn_ent, reply);
  1597. return 0;
  1598. }
  1599. static void
  1600. accept_fuzzy_collection_socket (gint fd, short what, void *arg)
  1601. {
  1602. struct rspamd_worker *worker = (struct rspamd_worker *)arg;
  1603. rspamd_inet_addr_t *addr;
  1604. gint nfd;
  1605. struct rspamd_fuzzy_storage_ctx *ctx;
  1606. struct rspamd_fuzzy_collection_session *session;
  1607. if ((nfd =
  1608. rspamd_accept_from_socket (fd, &addr, worker->accept_events)) == -1) {
  1609. msg_warn ("accept failed: %s", strerror (errno));
  1610. return;
  1611. }
  1612. /* Check for EAGAIN */
  1613. if (nfd == 0) {
  1614. return;
  1615. }
  1616. ctx = worker->ctx;
  1617. if (!ctx->collection_keypair) {
  1618. msg_err ("deny request from %s, as no local keypair is specified",
  1619. rspamd_inet_address_to_string (addr));
  1620. rspamd_inet_address_free (addr);
  1621. close (nfd);
  1622. return;
  1623. }
  1624. session = g_malloc0 (sizeof (*session));
  1625. session->ctx = ctx;
  1626. session->worker = worker;
  1627. rspamd_random_hex (session->uid, sizeof (session->uid) - 1);
  1628. session->uid[sizeof (session->uid) - 1] = '\0';
  1629. session->from_addr = addr;
  1630. rspamd_http_router_handle_socket (ctx->collection_rt, nfd, session);
  1631. msg_info_fuzzy_collection ("accepted connection from %s port %d, session ptr: %p",
  1632. rspamd_inet_address_to_string (addr),
  1633. rspamd_inet_address_get_port (addr),
  1634. session);
  1635. }
  1636. static void
  1637. rspamd_fuzzy_collection_periodic (gint fd, gshort what, gpointer ud)
  1638. {
  1639. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  1640. if (++ctx->updates_failed > ctx->updates_maxfail) {
  1641. msg_err ("cannot store more data in workqueue, discard "
  1642. "%ud updates after %d missed collection points",
  1643. ctx->updates_pending->len,
  1644. ctx->updates_maxfail);
  1645. ctx->updates_failed = 0;
  1646. ctx->updates_pending->len = 0;
  1647. /* Regenerate cookie */
  1648. ottery_rand_bytes (ctx->cookie, sizeof (ctx->cookie));
  1649. }
  1650. else {
  1651. msg_err ("fuzzy data has not been collected in time, "
  1652. "%ud updates are still pending, %d updates left",
  1653. ctx->updates_pending->len,
  1654. ctx->updates_maxfail - ctx->updates_failed);
  1655. }
  1656. if (ctx->worker->wanna_die) {
  1657. /* Plan exit */
  1658. struct timeval tv;
  1659. tv.tv_sec = 0;
  1660. tv.tv_usec = 0;
  1661. event_base_loopexit (ctx->ev_base, &tv);
  1662. }
  1663. }
  1664. static void
  1665. accept_fuzzy_mirror_socket (gint fd, short what, void *arg)
  1666. {
  1667. struct rspamd_worker *worker = (struct rspamd_worker *)arg;
  1668. rspamd_inet_addr_t *addr;
  1669. gint nfd;
  1670. struct rspamd_http_connection *http_conn;
  1671. struct rspamd_fuzzy_storage_ctx *ctx;
  1672. struct fuzzy_master_update_session *session;
  1673. if ((nfd =
  1674. rspamd_accept_from_socket (fd, &addr, worker->accept_events)) == -1) {
  1675. msg_warn ("accept failed: %s", strerror (errno));
  1676. return;
  1677. }
  1678. /* Check for EAGAIN */
  1679. if (nfd == 0) {
  1680. return;
  1681. }
  1682. ctx = worker->ctx;
  1683. if (!ctx->master_ips) {
  1684. msg_err ("deny update request from %s as no masters defined",
  1685. rspamd_inet_address_to_string (addr));
  1686. rspamd_inet_address_free (addr);
  1687. close (nfd);
  1688. return;
  1689. }
  1690. else if (rspamd_match_radix_map_addr (ctx->master_ips, addr) == NULL) {
  1691. msg_err ("deny update request from %s",
  1692. rspamd_inet_address_to_string (addr));
  1693. rspamd_inet_address_free (addr);
  1694. close (nfd);
  1695. return;
  1696. }
  1697. if (!ctx->sync_keypair) {
  1698. msg_err ("deny update request from %s, as no local keypair is specified",
  1699. rspamd_inet_address_to_string (addr));
  1700. rspamd_inet_address_free (addr);
  1701. close (nfd);
  1702. return;
  1703. }
  1704. session = g_malloc0 (sizeof (*session));
  1705. session->name = rspamd_inet_address_to_string (addr);
  1706. rspamd_random_hex (session->uid, sizeof (session->uid) - 1);
  1707. session->uid[sizeof (session->uid) - 1] = '\0';
  1708. http_conn = rspamd_http_connection_new (
  1709. ctx->http_ctx,
  1710. nfd,
  1711. NULL,
  1712. rspamd_fuzzy_mirror_error_handler,
  1713. rspamd_fuzzy_mirror_finish_handler,
  1714. 0,
  1715. RSPAMD_HTTP_SERVER);
  1716. rspamd_http_connection_set_key (http_conn, ctx->sync_keypair);
  1717. session->ctx = ctx;
  1718. session->conn = http_conn;
  1719. session->addr = addr;
  1720. session->sock = nfd;
  1721. rspamd_http_connection_read_message (http_conn,
  1722. session,
  1723. &ctx->master_io_tv);
  1724. }
  1725. /*
  1726. * Accept new connection and construct task
  1727. */
  1728. static void
  1729. accept_fuzzy_socket (gint fd, short what, void *arg)
  1730. {
  1731. struct rspamd_worker *worker = (struct rspamd_worker *)arg;
  1732. struct fuzzy_session *session;
  1733. rspamd_inet_addr_t *addr;
  1734. gssize r;
  1735. guint8 buf[512];
  1736. guint64 *nerrors;
  1737. /* Got some data */
  1738. if (what == EV_READ) {
  1739. for (;;) {
  1740. worker->nconns++;
  1741. r = rspamd_inet_address_recvfrom (fd,
  1742. buf,
  1743. sizeof (buf),
  1744. 0,
  1745. &addr);
  1746. if (r == -1) {
  1747. if (errno == EINTR) {
  1748. continue;
  1749. }
  1750. else if (errno == EAGAIN || errno == EWOULDBLOCK) {
  1751. return;
  1752. }
  1753. msg_err ("got error while reading from socket: %d, %s",
  1754. errno,
  1755. strerror (errno));
  1756. return;
  1757. }
  1758. session = g_malloc0 (sizeof (*session));
  1759. REF_INIT_RETAIN (session, fuzzy_session_destroy);
  1760. session->worker = worker;
  1761. session->fd = fd;
  1762. session->ctx = worker->ctx;
  1763. session->time = (guint64) time (NULL);
  1764. session->addr = addr;
  1765. if (rspamd_fuzzy_cmd_from_wire (buf, r, session)) {
  1766. /* Check shingles count sanity */
  1767. rspamd_fuzzy_process_command (session);
  1768. }
  1769. else {
  1770. /* Discard input */
  1771. session->ctx->stat.invalid_requests ++;
  1772. msg_debug ("invalid fuzzy command of size %z received", r);
  1773. nerrors = rspamd_lru_hash_lookup (session->ctx->errors_ips,
  1774. addr, -1);
  1775. if (nerrors == NULL) {
  1776. nerrors = g_malloc (sizeof (*nerrors));
  1777. *nerrors = 1;
  1778. rspamd_lru_hash_insert (session->ctx->errors_ips,
  1779. rspamd_inet_address_copy (addr),
  1780. nerrors, -1, -1);
  1781. }
  1782. else {
  1783. *nerrors = *nerrors + 1;
  1784. }
  1785. }
  1786. REF_RELEASE (session);
  1787. }
  1788. }
  1789. }
  1790. static gboolean
  1791. rspamd_fuzzy_storage_periodic_callback (void *ud)
  1792. {
  1793. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  1794. if (ctx->updates_pending->len > 0) {
  1795. rspamd_fuzzy_process_updates_queue (ctx, local_db_name, FALSE);
  1796. return TRUE;
  1797. }
  1798. return FALSE;
  1799. }
  1800. static gboolean
  1801. rspamd_fuzzy_storage_sync (struct rspamd_main *rspamd_main,
  1802. struct rspamd_worker *worker, gint fd,
  1803. gint attached_fd,
  1804. struct rspamd_control_command *cmd,
  1805. gpointer ud)
  1806. {
  1807. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  1808. struct rspamd_control_reply rep;
  1809. rep.reply.fuzzy_sync.status = 0;
  1810. if (ctx->backend && worker->index == 0) {
  1811. rspamd_fuzzy_process_updates_queue (ctx, local_db_name, FALSE);
  1812. rspamd_fuzzy_backend_start_update (ctx->backend, ctx->sync_timeout,
  1813. rspamd_fuzzy_storage_periodic_callback, ctx);
  1814. }
  1815. if (write (fd, &rep, sizeof (rep)) != sizeof (rep)) {
  1816. msg_err ("cannot write reply to the control socket: %s",
  1817. strerror (errno));
  1818. }
  1819. return TRUE;
  1820. }
  1821. static gboolean
  1822. rspamd_fuzzy_storage_reload (struct rspamd_main *rspamd_main,
  1823. struct rspamd_worker *worker, gint fd,
  1824. gint attached_fd,
  1825. struct rspamd_control_command *cmd,
  1826. gpointer ud)
  1827. {
  1828. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  1829. GError *err = NULL;
  1830. struct rspamd_control_reply rep;
  1831. msg_info ("reloading fuzzy storage after receiving reload command");
  1832. if (ctx->backend) {
  1833. /* Close backend and reopen it one more time */
  1834. rspamd_fuzzy_backend_close (ctx->backend);
  1835. }
  1836. memset (&rep, 0, sizeof (rep));
  1837. rep.type = RSPAMD_CONTROL_RELOAD;
  1838. if ((ctx->backend = rspamd_fuzzy_backend_create (ctx->ev_base,
  1839. worker->cf->options, rspamd_main->cfg,
  1840. &err)) == NULL) {
  1841. msg_err ("cannot open backend after reload: %e", err);
  1842. g_error_free (err);
  1843. rep.reply.reload.status = err->code;
  1844. }
  1845. else {
  1846. rep.reply.reload.status = 0;
  1847. }
  1848. if (ctx->backend && worker->index == 0) {
  1849. rspamd_fuzzy_backend_start_update (ctx->backend, ctx->sync_timeout,
  1850. rspamd_fuzzy_storage_periodic_callback, ctx);
  1851. }
  1852. if (write (fd, &rep, sizeof (rep)) != sizeof (rep)) {
  1853. msg_err ("cannot write reply to the control socket: %s",
  1854. strerror (errno));
  1855. }
  1856. return TRUE;
  1857. }
  1858. static ucl_object_t *
  1859. rspamd_fuzzy_storage_stat_key (struct fuzzy_key_stat *key_stat)
  1860. {
  1861. ucl_object_t *res;
  1862. res = ucl_object_typed_new (UCL_OBJECT);
  1863. ucl_object_insert_key (res, ucl_object_fromint (key_stat->checked),
  1864. "checked", 0, false);
  1865. ucl_object_insert_key (res, ucl_object_fromint (key_stat->matched),
  1866. "matched", 0, false);
  1867. ucl_object_insert_key (res, ucl_object_fromint (key_stat->added),
  1868. "added", 0, false);
  1869. ucl_object_insert_key (res, ucl_object_fromint (key_stat->deleted),
  1870. "deleted", 0, false);
  1871. ucl_object_insert_key (res, ucl_object_fromint (key_stat->errors),
  1872. "errors", 0, false);
  1873. return res;
  1874. }
  1875. static ucl_object_t *
  1876. rspamd_fuzzy_stat_to_ucl (struct rspamd_fuzzy_storage_ctx *ctx, gboolean ip_stat)
  1877. {
  1878. struct fuzzy_key_stat *key_stat;
  1879. GHashTableIter it;
  1880. struct fuzzy_key *key;
  1881. ucl_object_t *obj, *keys_obj, *elt, *ip_elt, *ip_cur;
  1882. gpointer k, v;
  1883. gint i;
  1884. gchar keyname[17];
  1885. obj = ucl_object_typed_new (UCL_OBJECT);
  1886. keys_obj = ucl_object_typed_new (UCL_OBJECT);
  1887. g_hash_table_iter_init (&it, ctx->keys);
  1888. while (g_hash_table_iter_next (&it, &k, &v)) {
  1889. key = v;
  1890. key_stat = key->stat;
  1891. if (key_stat) {
  1892. rspamd_snprintf (keyname, sizeof (keyname), "%8bs", k);
  1893. elt = rspamd_fuzzy_storage_stat_key (key_stat);
  1894. if (key_stat->last_ips && ip_stat) {
  1895. i = 0;
  1896. ip_elt = ucl_object_typed_new (UCL_OBJECT);
  1897. while ((i = rspamd_lru_hash_foreach (key_stat->last_ips,
  1898. i, &k, &v)) != -1) {
  1899. ip_cur = rspamd_fuzzy_storage_stat_key (v);
  1900. ucl_object_insert_key (ip_elt, ip_cur,
  1901. rspamd_inet_address_to_string (k), 0, true);
  1902. }
  1903. ucl_object_insert_key (elt, ip_elt, "ips", 0, false);
  1904. }
  1905. ucl_object_insert_key (keys_obj, elt, keyname, 0, true);
  1906. }
  1907. }
  1908. ucl_object_insert_key (obj, keys_obj, "keys", 0, false);
  1909. /* Now generic stats */
  1910. ucl_object_insert_key (obj,
  1911. ucl_object_fromint (ctx->stat.fuzzy_hashes),
  1912. "fuzzy_stored",
  1913. 0,
  1914. false);
  1915. ucl_object_insert_key (obj,
  1916. ucl_object_fromint (ctx->stat.fuzzy_hashes_expired),
  1917. "fuzzy_expired",
  1918. 0,
  1919. false);
  1920. ucl_object_insert_key (obj,
  1921. ucl_object_fromint (ctx->stat.invalid_requests),
  1922. "invalid_requests",
  1923. 0,
  1924. false);
  1925. if (ctx->errors_ips && ip_stat) {
  1926. i = 0;
  1927. ip_elt = ucl_object_typed_new (UCL_OBJECT);
  1928. while ((i = rspamd_lru_hash_foreach (ctx->errors_ips, i, &k, &v)) != -1) {
  1929. ucl_object_insert_key (ip_elt,
  1930. ucl_object_fromint (*(guint64 *)v),
  1931. rspamd_inet_address_to_string (k), 0, true);
  1932. }
  1933. ucl_object_insert_key (obj,
  1934. ip_elt,
  1935. "errors_ips",
  1936. 0,
  1937. false);
  1938. }
  1939. /* Checked by epoch */
  1940. elt = ucl_object_typed_new (UCL_ARRAY);
  1941. for (i = RSPAMD_FUZZY_EPOCH6; i < RSPAMD_FUZZY_EPOCH_MAX; i++) {
  1942. ucl_array_append (elt,
  1943. ucl_object_fromint (ctx->stat.fuzzy_hashes_checked[i]));
  1944. }
  1945. ucl_object_insert_key (obj, elt, "fuzzy_checked", 0, false);
  1946. /* Shingles by epoch */
  1947. elt = ucl_object_typed_new (UCL_ARRAY);
  1948. for (i = RSPAMD_FUZZY_EPOCH6; i < RSPAMD_FUZZY_EPOCH_MAX; i++) {
  1949. ucl_array_append (elt,
  1950. ucl_object_fromint (ctx->stat.fuzzy_shingles_checked[i]));
  1951. }
  1952. ucl_object_insert_key (obj, elt, "fuzzy_shingles", 0, false);
  1953. /* Matched by epoch */
  1954. elt = ucl_object_typed_new (UCL_ARRAY);
  1955. for (i = RSPAMD_FUZZY_EPOCH6; i < RSPAMD_FUZZY_EPOCH_MAX; i++) {
  1956. ucl_array_append (elt,
  1957. ucl_object_fromint (ctx->stat.fuzzy_hashes_found[i]));
  1958. }
  1959. ucl_object_insert_key (obj, elt, "fuzzy_found", 0, false);
  1960. return obj;
  1961. }
  1962. static gboolean
  1963. rspamd_fuzzy_storage_stat (struct rspamd_main *rspamd_main,
  1964. struct rspamd_worker *worker, gint fd,
  1965. gint attached_fd,
  1966. struct rspamd_control_command *cmd,
  1967. gpointer ud)
  1968. {
  1969. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  1970. struct rspamd_control_reply rep;
  1971. ucl_object_t *obj;
  1972. struct ucl_emitter_functions *emit_subr;
  1973. guchar fdspace[CMSG_SPACE(sizeof (int))];
  1974. struct iovec iov;
  1975. struct msghdr msg;
  1976. struct cmsghdr *cmsg;
  1977. gint outfd = -1;
  1978. gchar tmppath[PATH_MAX];
  1979. memset (&rep, 0, sizeof (rep));
  1980. rep.type = RSPAMD_CONTROL_FUZZY_STAT;
  1981. rspamd_snprintf (tmppath, sizeof (tmppath), "%s%c%s-XXXXXXXXXX",
  1982. rspamd_main->cfg->temp_dir, G_DIR_SEPARATOR, "fuzzy-stat");
  1983. if ((outfd = mkstemp (tmppath)) == -1) {
  1984. rep.reply.fuzzy_stat.status = errno;
  1985. msg_info_main ("cannot make temporary stat file for fuzzy stat: %s",
  1986. strerror (errno));
  1987. }
  1988. else {
  1989. rep.reply.fuzzy_stat.status = 0;
  1990. memcpy (rep.reply.fuzzy_stat.storage_id,
  1991. rspamd_fuzzy_backend_id (ctx->backend),
  1992. sizeof (rep.reply.fuzzy_stat.storage_id));
  1993. obj = rspamd_fuzzy_stat_to_ucl (ctx, TRUE);
  1994. emit_subr = ucl_object_emit_fd_funcs (outfd);
  1995. ucl_object_emit_full (obj, UCL_EMIT_JSON_COMPACT, emit_subr, NULL);
  1996. ucl_object_emit_funcs_free (emit_subr);
  1997. ucl_object_unref (obj);
  1998. /* Rewind output file */
  1999. close (outfd);
  2000. outfd = open (tmppath, O_RDONLY);
  2001. unlink (tmppath);
  2002. }
  2003. /* Now we can send outfd and status message */
  2004. memset (&msg, 0, sizeof (msg));
  2005. /* Attach fd to the message */
  2006. if (outfd != -1) {
  2007. memset (fdspace, 0, sizeof (fdspace));
  2008. msg.msg_control = fdspace;
  2009. msg.msg_controllen = sizeof (fdspace);
  2010. cmsg = CMSG_FIRSTHDR (&msg);
  2011. if (cmsg) {
  2012. cmsg->cmsg_level = SOL_SOCKET;
  2013. cmsg->cmsg_type = SCM_RIGHTS;
  2014. cmsg->cmsg_len = CMSG_LEN (sizeof (int));
  2015. memcpy (CMSG_DATA (cmsg), &outfd, sizeof (int));
  2016. }
  2017. }
  2018. iov.iov_base = &rep;
  2019. iov.iov_len = sizeof (rep);
  2020. msg.msg_iov = &iov;
  2021. msg.msg_iovlen = 1;
  2022. if (sendmsg (fd, &msg, 0) == -1) {
  2023. msg_err_main ("cannot send fuzzy stat: %s", strerror (errno));
  2024. }
  2025. if (outfd != -1) {
  2026. close (outfd);
  2027. }
  2028. return TRUE;
  2029. }
  2030. static gboolean
  2031. fuzzy_storage_parse_mirror (rspamd_mempool_t *pool,
  2032. const ucl_object_t *obj,
  2033. gpointer ud,
  2034. struct rspamd_rcl_section *section,
  2035. GError **err)
  2036. {
  2037. const ucl_object_t *elt;
  2038. struct rspamd_fuzzy_mirror *up = NULL;
  2039. struct rspamd_rcl_struct_parser *pd = ud;
  2040. struct rspamd_fuzzy_storage_ctx *ctx;
  2041. ctx = pd->user_struct;
  2042. if (ucl_object_type (obj) != UCL_OBJECT) {
  2043. g_set_error (err, g_quark_try_string ("fuzzy"), 100,
  2044. "mirror/slave option must be an object");
  2045. return FALSE;
  2046. }
  2047. elt = ucl_object_lookup (obj, "name");
  2048. if (elt == NULL) {
  2049. g_set_error (err, g_quark_try_string ("fuzzy"), 100,
  2050. "mirror option must have some name definition");
  2051. return FALSE;
  2052. }
  2053. up = g_malloc0 (sizeof (*up));
  2054. up->name = g_strdup (ucl_object_tostring (elt));
  2055. elt = ucl_object_lookup (obj, "key");
  2056. if (elt != NULL) {
  2057. up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
  2058. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  2059. }
  2060. if (up->key == NULL) {
  2061. g_set_error (err, g_quark_try_string ("fuzzy"), 100,
  2062. "cannot read mirror key");
  2063. goto err;
  2064. }
  2065. elt = ucl_object_lookup (obj, "hosts");
  2066. if (elt == NULL) {
  2067. g_set_error (err, g_quark_try_string ("fuzzy"), 100,
  2068. "mirror option must have some hosts definition");
  2069. goto err;
  2070. }
  2071. up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
  2072. if (!rspamd_upstreams_from_ucl (up->u, elt, 11335, NULL)) {
  2073. g_set_error (err, g_quark_try_string ("fuzzy"), 100,
  2074. "mirror has bad hosts definition");
  2075. goto err;
  2076. }
  2077. g_ptr_array_add (ctx->mirrors, up);
  2078. return TRUE;
  2079. err:
  2080. g_free (up->name);
  2081. rspamd_upstreams_destroy (up->u);
  2082. if (up->key) {
  2083. rspamd_pubkey_unref (up->key);
  2084. }
  2085. g_free (up);
  2086. return FALSE;
  2087. }
  2088. static gboolean
  2089. fuzzy_storage_parse_master_flags (rspamd_mempool_t *pool,
  2090. const ucl_object_t *obj,
  2091. gpointer ud,
  2092. struct rspamd_rcl_section *section,
  2093. GError **err)
  2094. {
  2095. const ucl_object_t *cur;
  2096. struct rspamd_rcl_struct_parser *pd = ud;
  2097. struct rspamd_fuzzy_storage_ctx *ctx;
  2098. ucl_object_iter_t it = NULL;
  2099. gulong remote_flag;
  2100. gint64 local_flag;
  2101. ctx = pd->user_struct;
  2102. if (ucl_object_type (obj) != UCL_OBJECT) {
  2103. g_set_error (err, g_quark_try_string ("fuzzy"), 100,
  2104. "master_flags option must be an object");
  2105. return FALSE;
  2106. }
  2107. while ((cur = ucl_iterate_object (obj, &it, true)) != NULL) {
  2108. if (rspamd_strtoul (cur->key, cur->keylen, &remote_flag) &&
  2109. ucl_object_toint_safe (cur, (int64_t *)&local_flag)) {
  2110. g_hash_table_insert (ctx->master_flags, GUINT_TO_POINTER (remote_flag),
  2111. GUINT_TO_POINTER (local_flag));
  2112. }
  2113. }
  2114. return TRUE;
  2115. }
  2116. static gboolean
  2117. fuzzy_parse_keypair (rspamd_mempool_t *pool,
  2118. const ucl_object_t *obj,
  2119. gpointer ud,
  2120. struct rspamd_rcl_section *section,
  2121. GError **err)
  2122. {
  2123. struct rspamd_rcl_struct_parser *pd = ud;
  2124. struct rspamd_fuzzy_storage_ctx *ctx;
  2125. struct rspamd_cryptobox_keypair *kp;
  2126. struct fuzzy_key_stat *keystat;
  2127. struct fuzzy_key *key;
  2128. const ucl_object_t *cur;
  2129. const guchar *pk;
  2130. ucl_object_iter_t it = NULL;
  2131. gboolean ret;
  2132. ctx = pd->user_struct;
  2133. pd->offset = G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, default_keypair);
  2134. /*
  2135. * Single key
  2136. */
  2137. if (ucl_object_type (obj) == UCL_STRING || ucl_object_type (obj)
  2138. == UCL_OBJECT) {
  2139. ret = rspamd_rcl_parse_struct_keypair (pool, obj, pd, section, err);
  2140. if (!ret) {
  2141. return ret;
  2142. }
  2143. /* Insert key to the hash table */
  2144. kp = ctx->default_keypair;
  2145. if (kp == NULL) {
  2146. return FALSE;
  2147. }
  2148. if (rspamd_keypair_alg (kp) != RSPAMD_CRYPTOBOX_MODE_25519 ||
  2149. rspamd_keypair_type (kp) != RSPAMD_KEYPAIR_KEX) {
  2150. return FALSE;
  2151. }
  2152. key = rspamd_mempool_alloc0 (pool, sizeof (*key));
  2153. key->key = kp;
  2154. keystat = rspamd_mempool_alloc0 (pool, sizeof (*keystat));
  2155. /* Hash of ip -> fuzzy_key_stat */
  2156. keystat->last_ips = rspamd_lru_hash_new_full (1024,
  2157. (GDestroyNotify) rspamd_inet_address_free, fuzzy_key_stat_dtor,
  2158. rspamd_inet_address_hash, rspamd_inet_address_equal);
  2159. key->stat = keystat;
  2160. pk = rspamd_keypair_component (kp, RSPAMD_KEYPAIR_COMPONENT_PK,
  2161. NULL);
  2162. g_hash_table_insert (ctx->keys, (gpointer)pk, key);
  2163. ctx->default_key = key;
  2164. msg_info_pool ("loaded keypair %*xs", 8, pk);
  2165. }
  2166. else if (ucl_object_type (obj) == UCL_ARRAY) {
  2167. while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
  2168. if (!fuzzy_parse_keypair (pool, cur, pd, section, err)) {
  2169. msg_err_pool ("cannot parse keypair");
  2170. }
  2171. }
  2172. }
  2173. return TRUE;
  2174. }
  2175. static guint
  2176. fuzzy_kp_hash (gconstpointer p)
  2177. {
  2178. return *(guint *)p;
  2179. }
  2180. static gboolean
  2181. fuzzy_kp_equal (gconstpointer a, gconstpointer b)
  2182. {
  2183. const guchar *pa = a, *pb = b;
  2184. return (memcmp (pa, pb, RSPAMD_FUZZY_KEYLEN) == 0);
  2185. }
  2186. gpointer
  2187. init_fuzzy (struct rspamd_config *cfg)
  2188. {
  2189. struct rspamd_fuzzy_storage_ctx *ctx;
  2190. GQuark type;
  2191. type = g_quark_try_string ("fuzzy");
  2192. ctx = rspamd_mempool_alloc0 (cfg->cfg_pool,
  2193. sizeof (struct rspamd_fuzzy_storage_ctx));
  2194. ctx->magic = rspamd_fuzzy_storage_magic;
  2195. ctx->sync_timeout = DEFAULT_SYNC_TIMEOUT;
  2196. ctx->master_timeout = DEFAULT_MASTER_TIMEOUT;
  2197. ctx->keypair_cache_size = DEFAULT_KEYPAIR_CACHE_SIZE;
  2198. ctx->keys = g_hash_table_new_full (fuzzy_kp_hash, fuzzy_kp_equal,
  2199. NULL, fuzzy_key_dtor);
  2200. rspamd_mempool_add_destructor (cfg->cfg_pool,
  2201. (rspamd_mempool_destruct_t)g_hash_table_unref, ctx->keys);
  2202. ctx->master_flags = g_hash_table_new (g_direct_hash, g_direct_equal);
  2203. rspamd_mempool_add_destructor (cfg->cfg_pool,
  2204. (rspamd_mempool_destruct_t)g_hash_table_unref, ctx->master_flags);
  2205. ctx->errors_ips = rspamd_lru_hash_new_full (1024,
  2206. (GDestroyNotify) rspamd_inet_address_free, g_free,
  2207. rspamd_inet_address_hash, rspamd_inet_address_equal);
  2208. rspamd_mempool_add_destructor (cfg->cfg_pool,
  2209. (rspamd_mempool_destruct_t)rspamd_lru_hash_destroy, ctx->errors_ips);
  2210. ctx->cfg = cfg;
  2211. ctx->mirrors = g_ptr_array_new ();
  2212. rspamd_mempool_add_destructor (cfg->cfg_pool,
  2213. (rspamd_mempool_destruct_t)rspamd_ptr_array_free_hard, ctx->mirrors);
  2214. ctx->updates_maxfail = DEFAULT_UPDATES_MAXFAIL;
  2215. ctx->collection_id_file = RSPAMD_DBDIR "/fuzzy_collection.id";
  2216. ctx->leaky_bucket_mask = DEFAULT_BUCKET_MASK;
  2217. ctx->leaky_bucket_ttl = DEFAULT_BUCKET_TTL;
  2218. ctx->max_buckets = DEFAULT_MAX_BUCKETS;
  2219. ctx->leaky_bucket_burst = NAN;
  2220. ctx->leaky_bucket_rate = NAN;
  2221. rspamd_rcl_register_worker_option (cfg,
  2222. type,
  2223. "sync",
  2224. rspamd_rcl_parse_struct_time,
  2225. ctx,
  2226. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx,
  2227. sync_timeout),
  2228. RSPAMD_CL_FLAG_TIME_FLOAT,
  2229. "Time to perform database sync, default: "
  2230. G_STRINGIFY (DEFAULT_SYNC_TIMEOUT) " seconds");
  2231. rspamd_rcl_register_worker_option (cfg,
  2232. type,
  2233. "expire",
  2234. rspamd_rcl_parse_struct_time,
  2235. ctx,
  2236. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx,
  2237. expire),
  2238. RSPAMD_CL_FLAG_TIME_FLOAT,
  2239. "Default expire time for hashes, default: "
  2240. G_STRINGIFY (DEFAULT_EXPIRE) " seconds");
  2241. rspamd_rcl_register_worker_option (cfg,
  2242. type,
  2243. "allow_update",
  2244. rspamd_rcl_parse_struct_ucl,
  2245. ctx,
  2246. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, update_map),
  2247. 0,
  2248. "Allow modifications from the following IP addresses");
  2249. rspamd_rcl_register_worker_option (cfg,
  2250. type,
  2251. "keypair",
  2252. fuzzy_parse_keypair,
  2253. ctx,
  2254. 0,
  2255. RSPAMD_CL_FLAG_MULTIPLE,
  2256. "Encryption keypair (can be repeated for different keys)");
  2257. rspamd_rcl_register_worker_option (cfg,
  2258. type,
  2259. "keypair_cache_size",
  2260. rspamd_rcl_parse_struct_integer,
  2261. ctx,
  2262. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx,
  2263. keypair_cache_size),
  2264. RSPAMD_CL_FLAG_UINT,
  2265. "Size of keypairs cache, default: "
  2266. G_STRINGIFY (DEFAULT_KEYPAIR_CACHE_SIZE));
  2267. rspamd_rcl_register_worker_option (cfg,
  2268. type,
  2269. "encrypted_only",
  2270. rspamd_rcl_parse_struct_boolean,
  2271. ctx,
  2272. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, encrypted_only),
  2273. 0,
  2274. "Allow encrypted requests only (and forbid all unknown keys or plaintext requests)");
  2275. rspamd_rcl_register_worker_option (cfg,
  2276. type,
  2277. "read_only",
  2278. rspamd_rcl_parse_struct_boolean,
  2279. ctx,
  2280. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, read_only),
  2281. 0,
  2282. "Work in read only mode");
  2283. rspamd_rcl_register_worker_option (cfg,
  2284. type,
  2285. "master_timeout",
  2286. rspamd_rcl_parse_struct_time,
  2287. ctx,
  2288. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, master_timeout),
  2289. RSPAMD_CL_FLAG_TIME_FLOAT,
  2290. "Master protocol IO timeout");
  2291. rspamd_rcl_register_worker_option (cfg,
  2292. type,
  2293. "sync_keypair",
  2294. rspamd_rcl_parse_struct_keypair,
  2295. ctx,
  2296. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, sync_keypair),
  2297. 0,
  2298. "Encryption key for master/slave updates");
  2299. rspamd_rcl_register_worker_option (cfg,
  2300. type,
  2301. "masters",
  2302. rspamd_rcl_parse_struct_ucl,
  2303. ctx,
  2304. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, masters_map),
  2305. 0,
  2306. "Allow master/slave updates from the following IP addresses");
  2307. rspamd_rcl_register_worker_option (cfg,
  2308. type,
  2309. "blocked",
  2310. rspamd_rcl_parse_struct_ucl,
  2311. ctx,
  2312. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, blocked_map),
  2313. 0,
  2314. "Block requests from specific networks");
  2315. rspamd_rcl_register_worker_option (cfg,
  2316. type,
  2317. "master_key",
  2318. rspamd_rcl_parse_struct_pubkey,
  2319. ctx,
  2320. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, master_key),
  2321. 0,
  2322. "Allow master/slave updates merely using the specified key");
  2323. rspamd_rcl_register_worker_option (cfg,
  2324. type,
  2325. "mirror",
  2326. fuzzy_storage_parse_mirror,
  2327. ctx,
  2328. 0,
  2329. RSPAMD_CL_FLAG_MULTIPLE,
  2330. "List of slave hosts");
  2331. rspamd_rcl_register_worker_option (cfg,
  2332. type,
  2333. "slave",
  2334. fuzzy_storage_parse_mirror,
  2335. ctx,
  2336. 0,
  2337. RSPAMD_CL_FLAG_MULTIPLE,
  2338. "List of slave hosts");
  2339. rspamd_rcl_register_worker_option (cfg,
  2340. type,
  2341. "master_flags",
  2342. fuzzy_storage_parse_master_flags,
  2343. ctx,
  2344. 0,
  2345. 0,
  2346. "Map of flags in form master_flags = { master_flag = local_flag; ... }; ");
  2347. rspamd_rcl_register_worker_option (cfg,
  2348. type,
  2349. "updates_maxfail",
  2350. rspamd_rcl_parse_struct_integer,
  2351. ctx,
  2352. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, updates_maxfail),
  2353. RSPAMD_CL_FLAG_UINT,
  2354. "Maximum number of updates to be failed before discarding");
  2355. rspamd_rcl_register_worker_option (cfg,
  2356. type,
  2357. "collection_only",
  2358. rspamd_rcl_parse_struct_boolean,
  2359. ctx,
  2360. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, collection_mode),
  2361. 0,
  2362. "Start fuzzy in collection only mode");
  2363. rspamd_rcl_register_worker_option (cfg,
  2364. type,
  2365. "collection_signkey",
  2366. rspamd_rcl_parse_struct_pubkey,
  2367. ctx,
  2368. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, collection_sign_key),
  2369. RSPAMD_CL_FLAG_SIGNKEY,
  2370. "Accept only signed requests with the specified key");
  2371. rspamd_rcl_register_worker_option (cfg,
  2372. type,
  2373. "collection_keypair",
  2374. rspamd_rcl_parse_struct_keypair,
  2375. ctx,
  2376. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, collection_keypair),
  2377. 0,
  2378. "Use the specified keypair to encrypt collection protocol");
  2379. rspamd_rcl_register_worker_option (cfg,
  2380. type,
  2381. "collection_id_file",
  2382. rspamd_rcl_parse_struct_string,
  2383. ctx,
  2384. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, collection_id_file),
  2385. RSPAMD_CL_FLAG_STRING_PATH,
  2386. "Store collection epoch in the desired file");
  2387. rspamd_rcl_register_worker_option (cfg,
  2388. type,
  2389. "skip_hashes",
  2390. rspamd_rcl_parse_struct_ucl,
  2391. ctx,
  2392. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, skip_map),
  2393. 0,
  2394. "Skip specific hashes from the map");
  2395. /* Ratelimits */
  2396. rspamd_rcl_register_worker_option (cfg,
  2397. type,
  2398. "ratelimit_whitelist",
  2399. rspamd_rcl_parse_struct_ucl,
  2400. ctx,
  2401. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, ratelimit_whitelist_map),
  2402. 0,
  2403. "Skip specific addresses from rate limiting");
  2404. rspamd_rcl_register_worker_option (cfg,
  2405. type,
  2406. "ratelimit_max_buckets",
  2407. rspamd_rcl_parse_struct_integer,
  2408. ctx,
  2409. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, max_buckets),
  2410. RSPAMD_CL_FLAG_UINT,
  2411. "Maximum number of leaky buckets (default: " G_STRINGIFY(DEFAULT_MAX_BUCKETS) ")");
  2412. rspamd_rcl_register_worker_option (cfg,
  2413. type,
  2414. "ratelimit_network_mask",
  2415. rspamd_rcl_parse_struct_integer,
  2416. ctx,
  2417. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, leaky_bucket_mask),
  2418. RSPAMD_CL_FLAG_UINT,
  2419. "Network mask to apply for IPv4 rate addresses (default: " G_STRINGIFY(DEFAULT_BUCKET_MASK) ")");
  2420. rspamd_rcl_register_worker_option (cfg,
  2421. type,
  2422. "ratelimit_bucket_ttl",
  2423. rspamd_rcl_parse_struct_time,
  2424. ctx,
  2425. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, leaky_bucket_ttl),
  2426. RSPAMD_CL_FLAG_TIME_INTEGER,
  2427. "Time to live for ratelimit element (default: " G_STRINGIFY(DEFAULT_BUCKET_TTL) ")");
  2428. rspamd_rcl_register_worker_option (cfg,
  2429. type,
  2430. "ratelimit_rate",
  2431. rspamd_rcl_parse_struct_double,
  2432. ctx,
  2433. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, leaky_bucket_rate),
  2434. 0,
  2435. "Leak rate in requests per second");
  2436. rspamd_rcl_register_worker_option (cfg,
  2437. type,
  2438. "ratelimit_burst",
  2439. rspamd_rcl_parse_struct_double,
  2440. ctx,
  2441. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, leaky_bucket_burst),
  2442. 0,
  2443. "Peak value for ratelimit bucket");
  2444. rspamd_rcl_register_worker_option (cfg,
  2445. type,
  2446. "ratelimit_log_only",
  2447. rspamd_rcl_parse_struct_boolean,
  2448. ctx,
  2449. G_STRUCT_OFFSET (struct rspamd_fuzzy_storage_ctx, ratelimit_log_only),
  2450. 0,
  2451. "Don't really ban on ratelimit reaching, just log");
  2452. return ctx;
  2453. }
  2454. static void
  2455. rspamd_fuzzy_peer_io (gint fd, gshort what, gpointer d)
  2456. {
  2457. struct fuzzy_peer_cmd cmd;
  2458. struct rspamd_fuzzy_storage_ctx *ctx = d;
  2459. gssize r;
  2460. r = read (fd, &cmd, sizeof (cmd));
  2461. if (r != sizeof (cmd)) {
  2462. if (errno == EINTR) {
  2463. rspamd_fuzzy_peer_io (fd, what, d);
  2464. return;
  2465. }
  2466. if (errno != EAGAIN) {
  2467. msg_err ("cannot read command from peers: %s", strerror (errno));
  2468. }
  2469. }
  2470. else {
  2471. g_array_append_val (ctx->updates_pending, cmd);
  2472. }
  2473. }
  2474. static void
  2475. fuzzy_peer_rep (struct rspamd_worker *worker,
  2476. struct rspamd_srv_reply *rep, gint rep_fd,
  2477. gpointer ud)
  2478. {
  2479. struct rspamd_fuzzy_storage_ctx *ctx = ud;
  2480. GList *cur;
  2481. struct rspamd_worker_listen_socket *ls;
  2482. struct event *accept_events;
  2483. ctx->peer_fd = rep_fd;
  2484. if (rep_fd == -1) {
  2485. msg_err ("cannot receive peer fd from the main process");
  2486. exit (EXIT_FAILURE);
  2487. }
  2488. else {
  2489. rspamd_socket_nonblocking (rep_fd);
  2490. }
  2491. msg_info ("got peer fd reply from the main process");
  2492. /* Start listening */
  2493. cur = worker->cf->listen_socks;
  2494. while (cur) {
  2495. ls = cur->data;
  2496. if (ls->fd != -1) {
  2497. msg_info ("start listening on %s",
  2498. rspamd_inet_address_to_string_pretty (ls->addr));
  2499. if (ls->type == RSPAMD_WORKER_SOCKET_UDP) {
  2500. accept_events = g_malloc0 (sizeof (struct event) * 2);
  2501. event_set (&accept_events[0], ls->fd, EV_READ | EV_PERSIST,
  2502. accept_fuzzy_socket, worker);
  2503. event_base_set (ctx->ev_base, &accept_events[0]);
  2504. event_add (&accept_events[0], NULL);
  2505. worker->accept_events = g_list_prepend (worker->accept_events,
  2506. accept_events);
  2507. }
  2508. else if (worker->index == 0) {
  2509. /* We allow TCP listeners only for a update worker */
  2510. accept_events = g_malloc0 (sizeof (struct event) * 2);
  2511. if (ctx->collection_mode) {
  2512. event_set (&accept_events[0], ls->fd, EV_READ | EV_PERSIST,
  2513. accept_fuzzy_collection_socket, worker);
  2514. }
  2515. else {
  2516. event_set (&accept_events[0], ls->fd, EV_READ | EV_PERSIST,
  2517. accept_fuzzy_mirror_socket, worker);
  2518. }
  2519. event_base_set (ctx->ev_base, &accept_events[0]);
  2520. event_add (&accept_events[0], NULL);
  2521. worker->accept_events = g_list_prepend (worker->accept_events,
  2522. accept_events);
  2523. }
  2524. }
  2525. cur = g_list_next (cur);
  2526. }
  2527. if (worker->index == 0 && ctx->peer_fd != -1) {
  2528. /* Listen for peer requests */
  2529. event_set (&ctx->peer_ev, ctx->peer_fd, EV_READ | EV_PERSIST,
  2530. rspamd_fuzzy_peer_io, ctx);
  2531. event_base_set (ctx->ev_base, &ctx->peer_ev);
  2532. event_add (&ctx->peer_ev, NULL);
  2533. }
  2534. }
  2535. /*
  2536. * Start worker process
  2537. */
  2538. void
  2539. start_fuzzy (struct rspamd_worker *worker)
  2540. {
  2541. struct rspamd_fuzzy_storage_ctx *ctx = worker->ctx;
  2542. GError *err = NULL;
  2543. struct rspamd_srv_command srv_cmd;
  2544. struct rspamd_config *cfg = worker->srv->cfg;
  2545. ctx->ev_base = rspamd_prepare_worker (worker,
  2546. "fuzzy",
  2547. NULL);
  2548. ctx->peer_fd = -1;
  2549. ctx->worker = worker;
  2550. ctx->cfg = worker->srv->cfg;
  2551. double_to_tv (ctx->master_timeout, &ctx->master_io_tv);
  2552. ctx->resolver = dns_resolver_init (worker->srv->logger,
  2553. ctx->ev_base,
  2554. worker->srv->cfg);
  2555. rspamd_upstreams_library_config (worker->srv->cfg, ctx->cfg->ups_ctx,
  2556. ctx->ev_base, ctx->resolver->r);
  2557. if (ctx->keypair_cache_size > 0) {
  2558. /* Create keypairs cache */
  2559. ctx->keypair_cache = rspamd_keypair_cache_new (ctx->keypair_cache_size);
  2560. }
  2561. ctx->http_ctx = rspamd_http_context_create (cfg, ctx->ev_base);
  2562. if (!ctx->collection_mode) {
  2563. /*
  2564. * Open DB and perform VACUUM
  2565. */
  2566. if ((ctx->backend = rspamd_fuzzy_backend_create (ctx->ev_base,
  2567. worker->cf->options, cfg, &err)) == NULL) {
  2568. msg_err ("cannot open backend: %e", err);
  2569. if (err) {
  2570. g_error_free (err);
  2571. }
  2572. exit (EXIT_SUCCESS);
  2573. }
  2574. rspamd_fuzzy_backend_count (ctx->backend, fuzzy_count_callback, ctx);
  2575. if (worker->index == 0) {
  2576. ctx->updates_pending = g_array_sized_new (FALSE, FALSE,
  2577. sizeof (struct fuzzy_peer_cmd), 1024);
  2578. rspamd_fuzzy_backend_start_update (ctx->backend, ctx->sync_timeout,
  2579. rspamd_fuzzy_storage_periodic_callback, ctx);
  2580. }
  2581. double_to_tv (ctx->sync_timeout, &ctx->stat_tv);
  2582. event_set (&ctx->stat_ev, -1, EV_TIMEOUT, rspamd_fuzzy_stat_callback, ctx);
  2583. event_base_set (ctx->ev_base, &ctx->stat_ev);
  2584. event_add (&ctx->stat_ev, &ctx->stat_tv);
  2585. /* Register custom reload and stat commands for the control socket */
  2586. rspamd_control_worker_add_cmd_handler (worker, RSPAMD_CONTROL_RELOAD,
  2587. rspamd_fuzzy_storage_reload, ctx);
  2588. rspamd_control_worker_add_cmd_handler (worker, RSPAMD_CONTROL_FUZZY_STAT,
  2589. rspamd_fuzzy_storage_stat, ctx);
  2590. rspamd_control_worker_add_cmd_handler (worker, RSPAMD_CONTROL_FUZZY_SYNC,
  2591. rspamd_fuzzy_storage_sync, ctx);
  2592. }
  2593. else {
  2594. /*
  2595. * In collection mode we do a different thing:
  2596. * we collect fuzzy hashes in the updates queue and ignore all read commands
  2597. */
  2598. if (worker->index == 0) {
  2599. ctx->updates_pending = g_array_sized_new (FALSE, FALSE,
  2600. sizeof (struct fuzzy_peer_cmd), 1024);
  2601. double_to_tv (ctx->sync_timeout, &ctx->stat_tv);
  2602. event_set (&ctx->stat_ev, -1, EV_TIMEOUT|EV_PERSIST,
  2603. rspamd_fuzzy_collection_periodic, ctx);
  2604. event_base_set (ctx->ev_base, &ctx->stat_ev);
  2605. event_add (&ctx->stat_ev, &ctx->stat_tv);
  2606. ctx->collection_rt = rspamd_http_router_new (
  2607. rspamd_fuzzy_collection_error_handler,
  2608. rspamd_fuzzy_collection_finish_handler,
  2609. &ctx->stat_tv,
  2610. NULL,
  2611. ctx->http_ctx);
  2612. if (ctx->collection_keypair) {
  2613. rspamd_http_router_set_key (ctx->collection_rt,
  2614. ctx->collection_keypair);
  2615. }
  2616. /* Try to load collection id */
  2617. if (ctx->collection_id_file) {
  2618. gint fd;
  2619. fd = rspamd_file_xopen (ctx->collection_id_file, O_RDONLY, 0,
  2620. FALSE);
  2621. if (fd == -1) {
  2622. if (errno != ENOENT) {
  2623. msg_err ("cannot open collection id from %s: %s",
  2624. ctx->collection_id_file, strerror (errno));
  2625. }
  2626. ctx->collection_id = 0;
  2627. }
  2628. else {
  2629. if (read (fd, &ctx->collection_id,
  2630. sizeof (ctx->collection_id)) == -1) {
  2631. msg_err ("cannot read collection id from %s: %s",
  2632. ctx->collection_id_file, strerror (errno));
  2633. ctx->collection_id = 0;
  2634. }
  2635. close (fd);
  2636. }
  2637. }
  2638. /* Generate new cookie */
  2639. ottery_rand_bytes (ctx->cookie, sizeof (ctx->cookie));
  2640. /* Register paths */
  2641. rspamd_http_router_add_path (ctx->collection_rt,
  2642. "/cookie",
  2643. rspamd_fuzzy_collection_cookie);
  2644. rspamd_http_router_add_path (ctx->collection_rt,
  2645. "/data",
  2646. rspamd_fuzzy_collection_data);
  2647. }
  2648. }
  2649. if (ctx->mirrors && ctx->mirrors->len != 0) {
  2650. if (ctx->sync_keypair == NULL) {
  2651. GString *pk_str = NULL;
  2652. ctx->sync_keypair = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
  2653. RSPAMD_CRYPTOBOX_MODE_25519);
  2654. pk_str = rspamd_keypair_print (ctx->sync_keypair,
  2655. RSPAMD_KEYPAIR_COMPONENT_PK|RSPAMD_KEYPAIR_BASE32);
  2656. msg_warn_config ("generating new temporary keypair for communicating"
  2657. " with slave hosts, pk is %s", pk_str->str);
  2658. g_string_free (pk_str, TRUE);
  2659. }
  2660. }
  2661. /* Create radix trees */
  2662. if (ctx->update_map != NULL) {
  2663. rspamd_config_radix_from_ucl (worker->srv->cfg, ctx->update_map,
  2664. "Allow fuzzy updates from specified addresses",
  2665. &ctx->update_ips, NULL);
  2666. }
  2667. if (ctx->masters_map != NULL) {
  2668. rspamd_config_radix_from_ucl (worker->srv->cfg, ctx->masters_map,
  2669. "Allow fuzzy master/slave updates from specified addresses",
  2670. &ctx->master_ips, NULL);
  2671. }
  2672. if (ctx->skip_map != NULL) {
  2673. struct rspamd_map *m;
  2674. if ((m = rspamd_map_add_from_ucl (cfg, ctx->skip_map,
  2675. "Skip hashes",
  2676. rspamd_kv_list_read,
  2677. rspamd_kv_list_fin,
  2678. rspamd_kv_list_dtor,
  2679. (void **)&ctx->skip_hashes)) == NULL) {
  2680. msg_warn_config ("cannot load hashes list from %s",
  2681. ucl_object_tostring (ctx->skip_map));
  2682. }
  2683. else {
  2684. m->active_http = TRUE;
  2685. }
  2686. }
  2687. if (ctx->blocked_map != NULL) {
  2688. rspamd_config_radix_from_ucl (worker->srv->cfg, ctx->blocked_map,
  2689. "Block fuzzy requests from the specific IPs",
  2690. &ctx->blocked_ips, NULL);
  2691. }
  2692. /* Create radix trees */
  2693. if (ctx->ratelimit_whitelist_map != NULL) {
  2694. rspamd_config_radix_from_ucl (worker->srv->cfg, ctx->ratelimit_whitelist_map,
  2695. "Skip ratelimits from specific ip addresses/networks",
  2696. &ctx->ratelimit_whitelist, NULL);
  2697. }
  2698. /* Ratelimits */
  2699. if (!isnan (ctx->leaky_bucket_rate) && !isnan (ctx->leaky_bucket_burst)) {
  2700. ctx->ratelimit_buckets = rspamd_lru_hash_new_full (ctx->max_buckets,
  2701. NULL, fuzzy_rl_bucket_free,
  2702. rspamd_inet_address_hash, rspamd_inet_address_equal);
  2703. }
  2704. /* Maps events */
  2705. ctx->resolver = dns_resolver_init (worker->srv->logger,
  2706. ctx->ev_base,
  2707. worker->srv->cfg);
  2708. rspamd_map_watch (worker->srv->cfg, ctx->ev_base, ctx->resolver, worker, 0);
  2709. /* Get peer pipe */
  2710. memset (&srv_cmd, 0, sizeof (srv_cmd));
  2711. srv_cmd.type = RSPAMD_SRV_SOCKETPAIR;
  2712. srv_cmd.cmd.spair.af = SOCK_DGRAM;
  2713. srv_cmd.cmd.spair.pair_num = worker->index;
  2714. memset (srv_cmd.cmd.spair.pair_id, 0, sizeof (srv_cmd.cmd.spair.pair_id));
  2715. memcpy (srv_cmd.cmd.spair.pair_id, "fuzzy", sizeof ("fuzzy"));
  2716. rspamd_srv_send_command (worker, ctx->ev_base, &srv_cmd, -1,
  2717. fuzzy_peer_rep, ctx);
  2718. event_base_loop (ctx->ev_base, 0);
  2719. rspamd_worker_block_signals ();
  2720. if (worker->index == 0 && ctx->updates_pending->len > 0) {
  2721. if (!ctx->collection_mode) {
  2722. rspamd_fuzzy_process_updates_queue (ctx, local_db_name, FALSE);
  2723. event_base_loop (ctx->ev_base, 0);
  2724. }
  2725. }
  2726. if (!ctx->collection_mode) {
  2727. rspamd_fuzzy_backend_close (ctx->backend);
  2728. }
  2729. else if (worker->index == 0) {
  2730. gint fd;
  2731. rspamd_http_router_free (ctx->collection_rt);
  2732. /* Try to save collection id */
  2733. fd = rspamd_file_xopen (ctx->collection_id_file,
  2734. O_WRONLY | O_CREAT | O_TRUNC, 00644, 0);
  2735. if (fd == -1) {
  2736. msg_err ("cannot open collection id to store in %s: %s",
  2737. ctx->collection_id_file, strerror (errno));
  2738. }
  2739. else {
  2740. if (write (fd, &ctx->collection_id,
  2741. sizeof (ctx->collection_id)) == -1) {
  2742. msg_err ("cannot store collection id in %s: %s",
  2743. ctx->collection_id_file, strerror (errno));
  2744. }
  2745. close (fd);
  2746. }
  2747. }
  2748. if (worker->index == 0) {
  2749. g_array_free (ctx->updates_pending, TRUE);
  2750. }
  2751. if (ctx->peer_fd != -1) {
  2752. if (worker->index == 0) {
  2753. event_del (&ctx->peer_ev);
  2754. }
  2755. close (ctx->peer_fd);
  2756. }
  2757. if (ctx->keypair_cache) {
  2758. rspamd_keypair_cache_destroy (ctx->keypair_cache);
  2759. }
  2760. struct rspamd_http_context *http_ctx = ctx->http_ctx;
  2761. REF_RELEASE (ctx->cfg);
  2762. rspamd_http_context_free (http_ctx);
  2763. rspamd_log_close (worker->srv->logger, TRUE);
  2764. exit (EXIT_SUCCESS);
  2765. }