12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255 |
- /*-
- * Copyright 2016 Vsevolod Stakhov
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
- #include "config.h"
- #include "libutil/util.h"
- #include "libutil/map.h"
- #include "libutil/upstream.h"
- #include "libutil/http.h"
- #include "libutil/http_private.h"
- #include "libserver/protocol.h"
- #include "libserver/protocol_internal.h"
- #include "libserver/cfg_file.h"
- #include "libserver/url.h"
- #include "libserver/dns.h"
- #include "libmime/message.h"
- #include "rspamd.h"
- #include "libserver/worker_util.h"
- #include "worker_private.h"
- #include "lua/lua_common.h"
- #include "keypairs_cache.h"
- #include "libstat/stat_api.h"
- #include "ottery.h"
- #include "unix-std.h"
- #include "libserver/milter.h"
- #include "libserver/milter_internal.h"
- #include "libmime/lang_detection.h"
- #include "contrib/zstd/zstd.h"
-
- #include <math.h>
-
- #ifdef HAVE_NETINET_TCP_H
- #include <netinet/tcp.h> /* for TCP_NODELAY */
- #endif
-
- /* Rotate keys each minute by default */
- #define DEFAULT_ROTATION_TIME 60.0
- #define DEFAULT_RETRIES 5
-
- #define msg_err_session(...) rspamd_default_log_function (G_LOG_LEVEL_CRITICAL, \
- session->pool->tag.tagname, session->pool->tag.uid, \
- G_STRFUNC, \
- __VA_ARGS__)
- #define msg_warn_session(...) rspamd_default_log_function (G_LOG_LEVEL_WARNING, \
- session->pool->tag.tagname, session->pool->tag.uid, \
- G_STRFUNC, \
- __VA_ARGS__)
- #define msg_info_session(...) rspamd_default_log_function (G_LOG_LEVEL_INFO, \
- session->pool->tag.tagname, session->pool->tag.uid, \
- G_STRFUNC, \
- __VA_ARGS__)
-
- #define msg_debug_session(...) rspamd_conditional_debug_fast (NULL, session->client_addr, \
- rspamd_proxy_log_id, "proxy", session->pool->tag.uid, \
- G_STRFUNC, \
- __VA_ARGS__)
-
- INIT_LOG_MODULE(proxy)
-
- gpointer init_rspamd_proxy (struct rspamd_config *cfg);
- void start_rspamd_proxy (struct rspamd_worker *worker);
-
- worker_t rspamd_proxy_worker = {
- "rspamd_proxy", /* Name */
- init_rspamd_proxy, /* Init function */
- start_rspamd_proxy, /* Start function */
- RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE | RSPAMD_WORKER_SCANNER,
- RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */
- RSPAMD_WORKER_VER
- };
-
- struct rspamd_http_upstream {
- gchar *name;
- gchar *settings_id;
- struct upstream_list *u;
- struct rspamd_cryptobox_pubkey *key;
- gdouble timeout;
- struct timeval io_tv;
- gint parser_from_ref;
- gint parser_to_ref;
- gboolean local;
- gboolean self_scan;
- gboolean compress;
- };
-
- struct rspamd_http_mirror {
- gchar *name;
- gchar *settings_id;
- struct upstream_list *u;
- struct rspamd_cryptobox_pubkey *key;
- gdouble prob;
- gdouble timeout;
- struct timeval io_tv;
- gint parser_from_ref;
- gint parser_to_ref;
- gboolean local;
- gboolean compress;
- };
-
- static const guint64 rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL;
-
- struct rspamd_proxy_ctx {
- guint64 magic;
- /* Events base */
- struct event_base *ev_base;
- /* DNS resolver */
- struct rspamd_dns_resolver *resolver;
- /* Config */
- struct rspamd_config *cfg;
- /* END OF COMMON PART */
- gdouble timeout;
- struct timeval io_tv;
- /* Encryption key for clients */
- struct rspamd_cryptobox_keypair *key;
- /* Keys cache */
- struct rspamd_keypair_cache *keys_cache;
- /* Upstreams to use */
- GHashTable *upstreams;
- /* Mirrors to send traffic to */
- GPtrArray *mirrors;
- /* Default upstream */
- struct rspamd_http_upstream *default_upstream;
- /* Local rotating keypair for upstreams */
- struct rspamd_cryptobox_keypair *local_key;
- struct event rotate_ev;
- gdouble rotate_tm;
- lua_State *lua_state;
- /* Array of callback functions called on end of scan to compare results */
- GArray *cmp_refs;
- /* Maximum count for retries */
- guint max_retries;
- /* If we have self_scanning backends, we need to work as a normal worker */
- gboolean has_self_scan;
- /* It is not HTTP but milter proxy */
- gboolean milter;
- /* Discard messages instead of rejecting them */
- gboolean discard_on_reject;
- /* Quarantine messages instead of rejecting them */
- gboolean quarantine_on_reject;
- /* Milter spam header */
- gchar *spam_header;
- /* CA name that can be used for client certificates */
- gchar *client_ca_name;
- /* Milter rejection message */
- gchar *reject_message;
- /* Sessions cache */
- void *sessions_cache;
- struct rspamd_milter_context milter_ctx;
- /* Language detector */
- struct rspamd_lang_detector *lang_det;
- };
-
- enum rspamd_backend_flags {
- RSPAMD_BACKEND_REPLIED = 1 << 0,
- RSPAMD_BACKEND_CLOSED = 1 << 1,
- RSPAMD_BACKEND_PARSED = 1 << 2,
- };
-
- struct rspamd_proxy_session;
-
- struct rspamd_proxy_backend_connection {
- const gchar *name;
- struct rspamd_cryptobox_keypair *local_key;
- struct rspamd_cryptobox_pubkey *remote_key;
- struct upstream *up;
- struct rspamd_http_connection *backend_conn;
- ucl_object_t *results;
- const gchar *err;
- struct rspamd_proxy_session *s;
- struct timeval *io_tv;
- gint backend_sock;
- enum rspamd_backend_flags flags;
- gint parser_from_ref;
- gint parser_to_ref;
- struct rspamd_task *task;
- };
-
- enum rspamd_proxy_legacy_support {
- LEGACY_SUPPORT_NO = 0,
- LEGACY_SUPPORT_RSPAMC,
- LEGACY_SUPPORT_SPAMC
- };
-
- struct rspamd_proxy_session {
- struct rspamd_worker *worker;
- rspamd_mempool_t *pool;
- struct rspamd_proxy_ctx *ctx;
- rspamd_inet_addr_t *client_addr;
- struct rspamd_http_connection *client_conn;
- struct rspamd_milter_session *client_milter_conn;
- struct rspamd_http_upstream *backend;
- gpointer map;
- gchar *fname;
- gpointer shmem_ref;
- struct rspamd_proxy_backend_connection *master_conn;
- struct rspamd_http_message *client_message;
- GPtrArray *mirror_conns;
- gsize map_len;
- gint client_sock;
- enum rspamd_proxy_legacy_support legacy_support;
- gint retries;
- ref_entry_t ref;
- };
-
- static gboolean proxy_send_master_message (struct rspamd_proxy_session *session);
-
- static GQuark
- rspamd_proxy_quark (void)
- {
- return g_quark_from_static_string ("rspamd-proxy");
- }
-
- static gboolean
- rspamd_proxy_parse_lua_parser (lua_State *L, const ucl_object_t *obj,
- gint *ref_from, gint *ref_to, GError **err)
- {
- const gchar *lua_script;
- gsize slen;
- gint err_idx, ref_idx;
- GString *tb = NULL;
- gboolean has_ref = FALSE;
-
- g_assert (obj != NULL);
- g_assert (ref_from != NULL);
- g_assert (ref_to != NULL);
-
- *ref_from = -1;
- *ref_to = -1;
-
- lua_script = ucl_object_tolstring (obj, &slen);
- lua_pushcfunction (L, &rspamd_lua_traceback);
- err_idx = lua_gettop (L);
-
- /* Load data */
- if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
- g_set_error (err,
- rspamd_proxy_quark (),
- EINVAL,
- "cannot load lua parser script: %s",
- lua_tostring (L, -1));
- lua_settop (L, 0); /* Error function */
-
- return FALSE;
- }
-
- /* Now do it */
- if (lua_pcall (L, 0, 1, err_idx) != 0) {
- tb = lua_touserdata (L, -1);
- g_set_error (err,
- rspamd_proxy_quark (),
- EINVAL,
- "cannot init lua parser script: %s",
- tb->str);
- g_string_free (tb, TRUE);
- lua_settop (L, 0);
-
- return FALSE;
- }
-
- if (lua_istable (L, -1)) {
- /*
- * We have a table, so we check for two keys:
- * 'from' -> function
- * 'to' -> function
- *
- * From converts parent request to a client one
- * To converts client request to a parent one
- */
- lua_pushstring (L, "from");
- lua_gettable (L, -2);
-
- if (lua_isfunction (L, -1)) {
- ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
- *ref_from = ref_idx;
- has_ref = TRUE;
- }
-
- lua_pushstring (L, "to");
- lua_gettable (L, -2);
-
- if (lua_isfunction (L, -1)) {
- ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
- *ref_to = ref_idx;
- has_ref = TRUE;
- }
- }
- else if (!lua_isfunction (L, -1)) {
- g_set_error (err,
- rspamd_proxy_quark (),
- EINVAL,
- "cannot init lua parser script: "
- "must return function");
- lua_settop (L, 0);
-
- return FALSE;
- }
- else {
- /* Just parser from protocol */
- ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
- *ref_from = ref_idx;
- lua_settop (L, 0);
- has_ref = TRUE;
- }
-
- return has_ref;
- }
-
- static gboolean
- rspamd_proxy_parse_upstream (rspamd_mempool_t *pool,
- const ucl_object_t *obj,
- gpointer ud,
- struct rspamd_rcl_section *section,
- GError **err)
- {
- const ucl_object_t *elt;
- struct rspamd_http_upstream *up = NULL;
- struct rspamd_proxy_ctx *ctx;
- struct rspamd_rcl_struct_parser *pd = ud;
- lua_State *L;
-
- ctx = pd->user_struct;
- L = ctx->lua_state;
-
- if (ucl_object_type (obj) != UCL_OBJECT) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "upstream option must be an object");
-
- return FALSE;
- }
-
- up = rspamd_mempool_alloc0 (pool, sizeof (*up));
-
- elt = ucl_object_lookup (obj, "name");
- if (elt == NULL) {
-
- if (ucl_object_key (obj)) {
- if (strcmp (ucl_object_key (obj), "upstream") == 0) {
- /* Iterate over the object and find upstream elements */
- ucl_object_iter_t it = NULL;
- const ucl_object_t *cur;
- gboolean ret = TRUE;
-
- while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
- if (!rspamd_proxy_parse_upstream (pool, cur, ud,
- section, err)) {
- ret = FALSE;
- }
- }
-
- return ret;
- }
- else {
- /* Inside upstream */
- up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
- }
- }
- else {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "upstream option must have some name definition");
-
- return FALSE;
- }
- }
- else {
- up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
- }
-
- up->parser_from_ref = -1;
- up->parser_to_ref = -1;
- up->timeout = ctx->timeout;
-
- elt = ucl_object_lookup (obj, "key");
- if (elt != NULL) {
- up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
- RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
-
- if (up->key == NULL) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "cannot read upstream key");
-
- goto err;
- }
-
- rspamd_mempool_add_destructor (pool,
- (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
- }
-
- elt = ucl_object_lookup (obj, "self_scan");
- if (elt && ucl_object_toboolean (elt)) {
- up->self_scan = TRUE;
- ctx->has_self_scan = TRUE;
- }
-
- elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
- if (elt && ucl_object_toboolean (elt)) {
- up->compress = TRUE;
- }
-
- elt = ucl_object_lookup (obj, "hosts");
-
- if (elt == NULL && !up->self_scan) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "upstream option must have some hosts definition");
-
- goto err;
- }
-
- if (elt) {
- up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
-
- if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "upstream has bad hosts definition");
-
- goto err;
- }
-
- rspamd_mempool_add_destructor (pool,
- (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
- }
-
- elt = ucl_object_lookup (obj, "default");
- if (elt) {
- if (ucl_object_toboolean (elt)) {
- ctx->default_upstream = up;
- }
- }
- else if (up->self_scan) {
- ctx->default_upstream = up;
- }
-
-
- elt = ucl_object_lookup (obj, "local");
- if (elt && ucl_object_toboolean (elt)) {
- up->local = TRUE;
- }
-
- elt = ucl_object_lookup (obj, "timeout");
- if (elt) {
- ucl_object_todouble_safe (elt, &up->timeout);
- }
-
- elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
- if (elt && ucl_object_type (elt) == UCL_STRING) {
- up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
- }
-
- /*
- * Accept lua function here in form
- * fun :: String -> UCL
- */
- elt = ucl_object_lookup (obj, "parser");
- if (elt) {
- if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
- &up->parser_to_ref, err)) {
- goto err;
- }
-
- rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
- rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
- }
-
- double_to_tv (up->timeout, &up->io_tv);
-
- g_hash_table_insert (ctx->upstreams, up->name, up);
-
- return TRUE;
-
- err:
- return FALSE;
- }
-
- static gboolean
- rspamd_proxy_parse_mirror (rspamd_mempool_t *pool,
- const ucl_object_t *obj,
- gpointer ud,
- struct rspamd_rcl_section *section,
- GError **err)
- {
- const ucl_object_t *elt;
- struct rspamd_http_mirror *up = NULL;
- struct rspamd_proxy_ctx *ctx;
- struct rspamd_rcl_struct_parser *pd = ud;
- lua_State *L;
-
- ctx = pd->user_struct;
- L = ctx->lua_state;
-
- if (ucl_object_type (obj) != UCL_OBJECT) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "mirror option must be an object");
-
- return FALSE;
- }
-
- up = rspamd_mempool_alloc0 (pool, sizeof (*up));
-
- elt = ucl_object_lookup (obj, "name");
- if (elt == NULL) {
-
- if (ucl_object_key (obj)) {
- if (strcmp (ucl_object_key (obj), "mirror") == 0) {
- /* Iterate over the object and find upstream elements */
- ucl_object_iter_t it = NULL;
- const ucl_object_t *cur;
- gboolean ret = TRUE;
-
- while ((cur = ucl_object_iterate (obj, &it, true)) != NULL) {
- if (!rspamd_proxy_parse_mirror (pool, cur, ud,
- section, err)) {
- ret = FALSE;
- }
- }
-
- return ret;
- }
- else {
- /* Inside upstream */
- up->name = rspamd_mempool_strdup (pool, ucl_object_key (obj));
- }
- }
- else {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "mirror option must have some name definition");
-
- return FALSE;
- }
- }
- else {
- up->name = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
- }
-
- up->parser_to_ref = -1;
- up->parser_from_ref = -1;
- up->timeout = ctx->timeout;
-
- elt = ucl_object_lookup (obj, "key");
- if (elt != NULL) {
- up->key = rspamd_pubkey_from_base32 (ucl_object_tostring (elt), 0,
- RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
-
- if (up->key == NULL) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "cannot read mirror key");
-
- goto err;
- }
-
- rspamd_mempool_add_destructor (pool,
- (rspamd_mempool_destruct_t)rspamd_pubkey_unref, up->key);
- }
-
- elt = ucl_object_lookup (obj, "hosts");
-
- if (elt == NULL) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "mirror option must have some hosts definition");
-
- goto err;
- }
-
- up->u = rspamd_upstreams_create (ctx->cfg->ups_ctx);
- if (!rspamd_upstreams_from_ucl (up->u, elt, 11333, NULL)) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "mirror has bad hosts definition");
-
- goto err;
- }
-
- rspamd_mempool_add_destructor (pool,
- (rspamd_mempool_destruct_t)rspamd_upstreams_destroy, up->u);
-
- elt = ucl_object_lookup_any (obj, "probability", "prob", NULL);
- if (elt) {
- up->prob = ucl_object_todouble (elt);
- }
- else {
- up->prob = 1.0;
- }
-
- elt = ucl_object_lookup (obj, "local");
- if (elt && ucl_object_toboolean (elt)) {
- up->local = TRUE;
- }
-
- elt = ucl_object_lookup_any (obj, "compress", "compression", NULL);
- if (elt && ucl_object_toboolean (elt)) {
- up->compress = TRUE;
- }
-
- elt = ucl_object_lookup (obj, "timeout");
- if (elt) {
- ucl_object_todouble_safe (elt, &up->timeout);
- }
-
- /*
- * Accept lua function here in form
- * fun :: String -> UCL
- */
- elt = ucl_object_lookup (obj, "parser");
- if (elt) {
- if (!rspamd_proxy_parse_lua_parser (L, elt, &up->parser_from_ref,
- &up->parser_to_ref, err)) {
- goto err;
- }
-
- rspamd_lua_add_ref_dtor (L, pool, up->parser_from_ref);
- rspamd_lua_add_ref_dtor (L, pool, up->parser_to_ref);
- }
-
- elt = ucl_object_lookup_any (obj, "settings", "settings_id", NULL);
- if (elt && ucl_object_type (elt) == UCL_STRING) {
- up->settings_id = rspamd_mempool_strdup (pool, ucl_object_tostring (elt));
- }
-
- double_to_tv (up->timeout, &up->io_tv);
-
- g_ptr_array_add (ctx->mirrors, up);
-
- return TRUE;
-
- err:
-
- return FALSE;
- }
-
- static gboolean
- rspamd_proxy_parse_script (rspamd_mempool_t *pool,
- const ucl_object_t *obj,
- gpointer ud,
- struct rspamd_rcl_section *section,
- GError **err)
- {
- struct rspamd_proxy_ctx *ctx;
- struct rspamd_rcl_struct_parser *pd = ud;
- lua_State *L;
- const gchar *lua_script;
- gsize slen;
- gint err_idx, ref_idx;
- GString *tb = NULL;
- struct stat st;
-
- ctx = pd->user_struct;
- L = ctx->lua_state;
-
- if (ucl_object_type (obj) != UCL_STRING) {
- g_set_error (err, rspamd_proxy_quark (), 100,
- "script option must be a string with file or lua chunk");
-
- return FALSE;
- }
-
- lua_script = ucl_object_tolstring (obj, &slen);
- lua_pushcfunction (L, &rspamd_lua_traceback);
- err_idx = lua_gettop (L);
-
- if (stat (lua_script, &st) != -1) {
- /* Load file */
- if (luaL_loadfile (L, lua_script) != 0) {
- g_set_error (err,
- rspamd_proxy_quark (),
- EINVAL,
- "cannot load lua parser script: %s",
- lua_tostring (L, -1));
- lua_settop (L, 0); /* Error function */
-
- goto err;
- }
- }
- else {
- /* Load data directly */
- if (luaL_loadbuffer (L, lua_script, slen, "proxy parser") != 0) {
- g_set_error (err,
- rspamd_proxy_quark (),
- EINVAL,
- "cannot load lua parser script: %s",
- lua_tostring (L, -1));
- lua_settop (L, 0); /* Error function */
-
- goto err;
- }
- }
-
- /* Now do it */
- if (lua_pcall (L, 0, 1, err_idx) != 0) {
- tb = lua_touserdata (L, -1);
- g_set_error (err,
- rspamd_proxy_quark (),
- EINVAL,
- "cannot init lua parser script: %s",
- tb->str);
- g_string_free (tb, TRUE);
- lua_settop (L, 0);
-
- goto err;
- }
-
- if (!lua_isfunction (L, -1)) {
- g_set_error (err,
- rspamd_proxy_quark (),
- EINVAL,
- "cannot init lua parser script: "
- "must return function, %s returned",
- lua_typename (L, lua_type (L, -1)));
- lua_settop (L, 0);
-
- goto err;
- }
-
- ref_idx = luaL_ref (L, LUA_REGISTRYINDEX);
- lua_settop (L, 0);
- g_array_append_val (ctx->cmp_refs, ref_idx);
-
- return TRUE;
-
- err:
- return FALSE;
- }
-
- gpointer
- init_rspamd_proxy (struct rspamd_config *cfg)
- {
- struct rspamd_proxy_ctx *ctx;
- GQuark type;
-
- type = g_quark_try_string ("rspamd_proxy");
-
- ctx = rspamd_mempool_alloc0 (cfg->cfg_pool,
- sizeof (struct rspamd_proxy_ctx));
- ctx->magic = rspamd_rspamd_proxy_magic;
- ctx->timeout = 120.0;
- ctx->upstreams = g_hash_table_new (rspamd_strcase_hash, rspamd_strcase_equal);
- rspamd_mempool_add_destructor (cfg->cfg_pool,
- (rspamd_mempool_destruct_t)g_hash_table_unref, ctx->upstreams);
- ctx->mirrors = g_ptr_array_new ();
- rspamd_mempool_add_destructor (cfg->cfg_pool,
- (rspamd_mempool_destruct_t)rspamd_ptr_array_free_hard, ctx->mirrors);
- ctx->rotate_tm = DEFAULT_ROTATION_TIME;
- ctx->cfg = cfg;
- ctx->lua_state = cfg->lua_state;
- ctx->cmp_refs = g_array_new (FALSE, FALSE, sizeof (gint));
- rspamd_mempool_add_destructor (cfg->cfg_pool,
- (rspamd_mempool_destruct_t)rspamd_array_free_hard, ctx->cmp_refs);
- ctx->max_retries = DEFAULT_RETRIES;
- ctx->spam_header = RSPAMD_MILTER_SPAM_HEADER;
-
- rspamd_rcl_register_worker_option (cfg,
- type,
- "timeout",
- rspamd_rcl_parse_struct_time,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, timeout),
- RSPAMD_CL_FLAG_TIME_FLOAT,
- "IO timeout");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "rotate",
- rspamd_rcl_parse_struct_time,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, rotate_tm),
- RSPAMD_CL_FLAG_TIME_FLOAT,
- "Rotation keys time, default: "
- G_STRINGIFY (DEFAULT_ROTATION_TIME) " seconds");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "keypair",
- rspamd_rcl_parse_struct_keypair,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, key),
- 0,
- "Server's keypair");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "upstream",
- rspamd_proxy_parse_upstream,
- ctx,
- 0,
- 0,
- "List of upstreams");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "mirror",
- rspamd_proxy_parse_mirror,
- ctx,
- 0,
- RSPAMD_CL_FLAG_MULTIPLE,
- "List of mirrors");
-
- rspamd_rcl_register_worker_option (cfg,
- type,
- "script",
- rspamd_proxy_parse_script,
- ctx,
- 0,
- RSPAMD_CL_FLAG_MULTIPLE,
- "Compare script to be executed");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "max_retries",
- rspamd_rcl_parse_struct_integer,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, max_retries),
- RSPAMD_CL_FLAG_UINT,
- "Maximum number of retries for master connection");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "milter",
- rspamd_rcl_parse_struct_boolean,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, milter),
- 0,
- "Accept milter connections, not HTTP");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "discard_on_reject",
- rspamd_rcl_parse_struct_boolean,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, discard_on_reject),
- 0,
- "Tell MTA to discard rejected messages silently");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "quarantine_on_reject",
- rspamd_rcl_parse_struct_boolean,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, quarantine_on_reject),
- 0,
- "Tell MTA to quarantine rejected messages");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "spam_header",
- rspamd_rcl_parse_struct_string,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, spam_header),
- 0,
- "Use the specific spam header (default: X-Spam)");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "client_ca_name",
- rspamd_rcl_parse_struct_string,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, client_ca_name),
- 0,
- "Allow certificates issued by this CA to be treated as client certificates");
- rspamd_rcl_register_worker_option (cfg,
- type,
- "reject_message",
- rspamd_rcl_parse_struct_string,
- ctx,
- G_STRUCT_OFFSET (struct rspamd_proxy_ctx, reject_message),
- 0,
- "Use custom rejection message");
-
- return ctx;
- }
-
- static void
- proxy_backend_close_connection (struct rspamd_proxy_backend_connection *conn)
- {
- if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) {
- if (conn->backend_conn) {
- rspamd_http_connection_reset (conn->backend_conn);
- rspamd_http_connection_unref (conn->backend_conn);
- close (conn->backend_sock);
- }
-
- conn->flags |= RSPAMD_BACKEND_CLOSED;
- }
- }
-
- static gboolean
- proxy_backend_parse_results (struct rspamd_proxy_session *session,
- struct rspamd_proxy_backend_connection *conn,
- lua_State *L, gint parser_ref,
- const gchar *in, gsize inlen)
- {
- struct ucl_parser *parser;
- GString *tb = NULL;
- gint err_idx;
-
- if (inlen == 0 || in == NULL) {
- return FALSE;
- }
-
- if (parser_ref != -1) {
- /* Call parser function */
- lua_pushcfunction (L, &rspamd_lua_traceback);
- err_idx = lua_gettop (L);
-
- lua_rawgeti (L, LUA_REGISTRYINDEX, parser_ref);
- /* XXX: copies all data */
- lua_pushlstring (L, in, inlen);
-
- if (lua_pcall (L, 1, 1, err_idx) != 0) {
- tb = lua_touserdata (L, -1);
- msg_err_session (
- "cannot run lua parser script: %s",
- tb->str);
- g_string_free (tb, TRUE);
- lua_settop (L, 0);
-
- return FALSE;
- }
-
- conn->results = ucl_object_lua_import (L, -1);
- lua_settop (L, 0);
- }
- else {
- parser = ucl_parser_new (0);
-
- if (!ucl_parser_add_chunk (parser, in, inlen)) {
- gchar *encoded;
-
- encoded = rspamd_encode_base64 (in, inlen, 0, NULL);
- msg_err_session ("cannot parse input: %s", ucl_parser_get_error (
- parser));
- msg_err_session ("input encoded: %s", encoded);
- ucl_parser_free (parser);
- g_free (encoded);
-
- return FALSE;
- }
-
- conn->results = ucl_parser_get_object (parser);
- ucl_parser_free (parser);
- }
-
- return TRUE;
- }
-
- static void
- proxy_call_cmp_script (struct rspamd_proxy_session *session, gint cbref)
- {
- GString *tb = NULL;
- gint err_idx;
- guint i;
- struct rspamd_proxy_backend_connection *conn;
- lua_State *L;
-
- L = session->ctx->lua_state;
- lua_pushcfunction (L, &rspamd_lua_traceback);
- err_idx = lua_gettop (L);
-
- lua_rawgeti (L, LUA_REGISTRYINDEX, cbref);
-
- lua_createtable (L, 0, session->mirror_conns->len + 1);
- /* Now push master results */
- if (session->master_conn && session->master_conn->results) {
- lua_pushstring (L, "master");
- ucl_object_push_lua (L, session->master_conn->results, true);
- lua_settable (L, -3);
- }
- else {
- lua_pushstring (L, "master");
- lua_pushstring (L, "no results");
- lua_settable (L, -3);
- }
-
- for (i = 0; i < session->mirror_conns->len; i ++) {
- conn = g_ptr_array_index (session->mirror_conns, i);
-
- if (conn->results) {
- lua_pushstring (L, conn->name);
- ucl_object_push_lua (L, conn->results, true);
- lua_settable (L, -3);
- }
- else {
- lua_pushstring (L, conn->name);
- lua_pushstring (L, conn->err ? conn->err : "unknown error");
- lua_settable (L, -3);
- }
- }
-
- if (lua_pcall (L, 1, 0, err_idx) != 0) {
- tb = lua_touserdata (L, -1);
- msg_err_session (
- "cannot run lua compare script: %s",
- tb->str);
- g_string_free (tb, TRUE);
- }
-
- lua_settop (L, 0);
- }
-
- static void
- proxy_session_dtor (struct rspamd_proxy_session *session)
- {
- guint i;
- gint cbref;
- struct rspamd_proxy_backend_connection *conn;
-
- if (session->master_conn && session->master_conn->results) {
- for (i = 0; i < session->ctx->cmp_refs->len; i++) {
- cbref = g_array_index (session->ctx->cmp_refs, gint, i);
- proxy_call_cmp_script (session, cbref);
- }
- }
-
- if (session->master_conn) {
- proxy_backend_close_connection (session->master_conn);
- }
-
- if (session->client_milter_conn) {
- rspamd_milter_session_unref (session->client_milter_conn);
- }
- else if (session->client_conn) {
- rspamd_http_connection_reset (session->client_conn);
- rspamd_http_connection_unref (session->client_conn);
- }
-
- if (session->map && session->map_len) {
- munmap (session->map, session->map_len);
- }
-
- for (i = 0; i < session->mirror_conns->len; i ++) {
- conn = g_ptr_array_index (session->mirror_conns, i);
-
- if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) {
- proxy_backend_close_connection (conn);
- }
-
- if (conn->results) {
- ucl_object_unref (conn->results);
- }
- }
-
- if (session->master_conn) {
- if (session->master_conn->results) {
- ucl_object_unref (session->master_conn->results);
- }
-
- if (session->master_conn->task) {
- rspamd_session_destroy (session->master_conn->task->s);
- }
- }
-
- g_ptr_array_free (session->mirror_conns, TRUE);
- rspamd_http_message_shmem_unref (session->shmem_ref);
- rspamd_http_message_unref (session->client_message);
-
- if (session->client_addr) {
- rspamd_inet_address_free (session->client_addr);
- }
-
- if (session->client_sock != -1) {
- close (session->client_sock);
- }
-
- if (session->ctx->sessions_cache) {
- rspamd_worker_session_cache_remove (session->ctx->sessions_cache,
- session);
- }
-
- if (session->pool) {
- rspamd_mempool_delete (session->pool);
- }
-
- g_free (session);
- }
-
- static void
- proxy_request_compress (struct rspamd_http_message *msg)
- {
- guint flags;
- ZSTD_CCtx *zctx;
- rspamd_fstring_t *body;
- const gchar *in;
- gsize inlen;
-
- flags = rspamd_http_message_get_flags (msg);
-
- if (!rspamd_http_message_find_header (msg, "Compression")) {
- if ((flags & RSPAMD_HTTP_FLAG_SHMEM) ||
- !(flags & RSPAMD_HTTP_FLAG_HAS_BODY)) {
- /* Cannot compress shared or empty message */
- return;
- }
-
- in = rspamd_http_message_get_body (msg, &inlen);
-
- if (in == NULL || inlen == 0) {
- return;
- }
-
- body = rspamd_fstring_sized_new (ZSTD_compressBound (inlen));
- zctx = ZSTD_createCCtx ();
- body->len = ZSTD_compressCCtx (zctx, body->str, body->allocated,
- in, inlen, 1);
-
- if (ZSTD_isError (body->len)) {
- msg_err ("compression error");
- rspamd_fstring_free (body);
- ZSTD_freeCCtx (zctx);
-
- return;
- }
-
- ZSTD_freeCCtx (zctx);
- rspamd_http_message_set_body_from_fstring_steal (msg, body);
- rspamd_http_message_add_header (msg, "Compression", "zstd");
- }
- }
-
- static void
- proxy_request_decompress (struct rspamd_http_message *msg)
- {
- rspamd_fstring_t *body;
- const gchar *in;
- gsize inlen, outlen, r;
- ZSTD_DStream *zstream;
- ZSTD_inBuffer zin;
- ZSTD_outBuffer zout;
-
- if (rspamd_http_message_find_header (msg, "Compression")) {
- in = rspamd_http_message_get_body (msg, &inlen);
-
- if (in == NULL || inlen == 0) {
- return;
- }
-
- zstream = ZSTD_createDStream ();
- ZSTD_initDStream (zstream);
-
- zin.pos = 0;
- zin.src = in;
- zin.size = inlen;
-
- if ((outlen = ZSTD_getDecompressedSize (zin.src, zin.size)) == 0) {
- outlen = ZSTD_DStreamOutSize ();
- }
-
- body = rspamd_fstring_sized_new (outlen);
- zout.dst = body->str;
- zout.pos = 0;
- zout.size = outlen;
-
- while (zin.pos < zin.size) {
- r = ZSTD_decompressStream (zstream, &zout, &zin);
-
- if (ZSTD_isError (r)) {
- msg_err ("Decompression error: %s", ZSTD_getErrorName (r));
- ZSTD_freeDStream (zstream);
- rspamd_fstring_free (body);
-
- return;
- }
-
- if (zout.pos == zout.size) {
- /* We need to extend output buffer */
- zout.size = zout.size * 1.5 + 1.0;
- body = rspamd_fstring_grow (body, zout.size);
- zout.size = body->allocated;
- zout.dst = body->str;
- }
- }
-
- body->len = zout.pos;
- ZSTD_freeDStream (zstream);
- rspamd_http_message_set_body_from_fstring_steal (msg, body);
- rspamd_http_message_remove_header (msg, "Compression");
- }
-
- return;
- }
-
- static struct rspamd_proxy_session *
- proxy_session_refresh (struct rspamd_proxy_session *session)
- {
- struct rspamd_proxy_session *nsession;
-
- nsession = g_malloc0 (sizeof (*nsession));
- nsession->client_milter_conn = session->client_milter_conn;
- session->client_milter_conn = NULL;
- rspamd_milter_update_userdata (nsession->client_milter_conn,
- nsession);
- nsession->client_addr = session->client_addr;
- session->client_addr = NULL;
- nsession->ctx = session->ctx;
- nsession->worker = session->worker;
- nsession->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (), "proxy");
- nsession->client_sock = session->client_sock;
- session->client_sock = -1;
- nsession->mirror_conns = g_ptr_array_sized_new (nsession->ctx->mirrors->len);
-
- REF_INIT_RETAIN (nsession, proxy_session_dtor);
-
- if (nsession->ctx->sessions_cache) {
- rspamd_worker_session_cache_add (nsession->ctx->sessions_cache,
- nsession->pool->tag.uid, &nsession->ref.refcount, nsession);
- }
-
- return nsession;
- }
-
- static gboolean
- proxy_check_file (struct rspamd_http_message *msg,
- struct rspamd_proxy_session *session)
- {
- const rspamd_ftok_t *tok, *key_tok;
- rspamd_ftok_t srch;
- gchar *file_str;
- GHashTable *query_args;
- GHashTableIter it;
- gpointer k, v;
- struct http_parser_url u;
- rspamd_fstring_t *new_url;
-
- tok = rspamd_http_message_find_header (msg, "File");
-
- if (tok) {
- file_str = rspamd_mempool_ftokdup (session->pool, tok);
- session->map = rspamd_file_xmap (file_str, PROT_READ, &session->map_len,
- TRUE);
-
- if (session->map == NULL) {
- if (session->map_len != 0) {
- msg_err_session ("cannot map %s: %s", file_str,
- strerror (errno));
-
- return FALSE;
- }
- }
- /* Remove header after processing */
- rspamd_http_message_remove_header (msg, "File");
- session->fname = file_str;
- }
- else {
- /* Need to parse query URL */
- if (http_parser_parse_url (RSPAMD_FSTRING_DATA (msg->url),
- RSPAMD_FSTRING_LEN (msg->url), 0, &u) != 0) {
- msg_err_session ("bad request url: %V", msg->url);
-
- return FALSE;
- }
-
- if (u.field_set & (1 << UF_QUERY)) {
- /* In case if we have a query, we need to store it somewhere */
- query_args = rspamd_http_message_parse_query (msg);
- srch.begin = "File";
- srch.len = strlen ("File");
- tok = g_hash_table_lookup (query_args, &srch);
-
- if (tok) {
- file_str = rspamd_mempool_ftokdup (session->pool, tok);
- session->map = rspamd_file_xmap (file_str, PROT_READ,
- &session->map_len, TRUE);
-
- if (session->map == NULL) {
- if (session->map_len != 0) {
- msg_err_session ("cannot map %s: %s", file_str,
- strerror (errno));
- g_hash_table_unref (query_args);
-
- return FALSE;
- }
- }
-
- /* We need to create a new URL with file attribute removed */
- new_url = rspamd_fstring_new_init (RSPAMD_FSTRING_DATA (msg->url),
- u.field_data[UF_QUERY].off);
- new_url = rspamd_fstring_append (new_url, "?", 1);
-
- g_hash_table_iter_init (&it, query_args);
-
- while (g_hash_table_iter_next (&it, &k, &v)) {
- key_tok = k;
- tok = v;
-
- if (!rspamd_ftok_icase_equal (key_tok, &srch)) {
- rspamd_printf_fstring (&new_url, "%T=%T&",
- key_tok, tok);
- }
- }
-
- /* Erase last character (might be either & or ?) */
- rspamd_fstring_erase (new_url, new_url->len - 1, 1);
-
- rspamd_fstring_free (msg->url);
- msg->url = new_url;
- session->fname = file_str;
- }
-
- g_hash_table_unref (query_args);
- }
-
- }
-
- return TRUE;
- }
-
- static void
- proxy_backend_mirror_error_handler (struct rspamd_http_connection *conn, GError *err)
- {
- struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
- struct rspamd_proxy_session *session;
-
- session = bk_conn->s;
- msg_info_session ("abnormally closing connection from backend: %s:%s, "
- "error: %e",
- bk_conn->name,
- rspamd_inet_address_to_string (rspamd_upstream_addr (bk_conn->up)),
- err);
-
- if (err) {
- bk_conn->err = rspamd_mempool_strdup (session->pool, err->message);
- }
-
- rspamd_upstream_fail (bk_conn->up, FALSE);
-
- proxy_backend_close_connection (bk_conn);
- REF_RELEASE (bk_conn->s);
- }
-
- static gint
- proxy_backend_mirror_finish_handler (struct rspamd_http_connection *conn,
- struct rspamd_http_message *msg)
- {
- struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
- struct rspamd_proxy_session *session;
-
- session = bk_conn->s;
-
- proxy_request_decompress (msg);
-
- if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
- bk_conn->parser_from_ref, msg->body_buf.begin, msg->body_buf.len)) {
- msg_warn_session ("cannot parse results from the mirror backend %s:%s",
- bk_conn->name,
- rspamd_inet_address_to_string (rspamd_upstream_addr (bk_conn->up)));
- bk_conn->err = "cannot parse ucl";
- }
-
- msg_info_session ("finished mirror connection to %s", bk_conn->name);
- rspamd_upstream_ok (bk_conn->up);
-
- proxy_backend_close_connection (bk_conn);
- REF_RELEASE (bk_conn->s);
-
- return 0;
- }
-
- static void
- proxy_open_mirror_connections (struct rspamd_proxy_session *session)
- {
- gdouble coin;
- struct rspamd_http_mirror *m;
- guint i;
- struct rspamd_proxy_backend_connection *bk_conn;
- struct rspamd_http_message *msg;
- GError *err = NULL;
-
- coin = rspamd_random_double ();
-
- for (i = 0; i < session->ctx->mirrors->len; i ++) {
- m = g_ptr_array_index (session->ctx->mirrors, i);
-
- if (m->prob < coin) {
- /* No luck */
- continue;
- }
-
- bk_conn = rspamd_mempool_alloc0 (session->pool,
- sizeof (*bk_conn));
- bk_conn->s = session;
- bk_conn->name = m->name;
- bk_conn->io_tv = &m->io_tv;
-
- bk_conn->up = rspamd_upstream_get (m->u,
- RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
- bk_conn->parser_from_ref = m->parser_from_ref;
- bk_conn->parser_to_ref = m->parser_to_ref;
-
- if (bk_conn->up == NULL) {
- msg_err_session ("cannot select upstream for %s", m->name);
- continue;
- }
-
- bk_conn->backend_sock = rspamd_inet_address_connect (
- rspamd_upstream_addr (bk_conn->up),
- SOCK_STREAM, TRUE);
-
- if (bk_conn->backend_sock == -1) {
- msg_err_session ("cannot connect upstream for %s", m->name);
- rspamd_upstream_fail (bk_conn->up, TRUE);
- continue;
- }
-
- msg = rspamd_http_connection_copy_msg (session->client_message, &err);
-
- if (msg == NULL) {
- msg_err_session ("cannot copy message to send to a mirror %s: %e",
- m->name, err);
- if (err) {
- g_error_free (err);
- }
- continue;
- }
-
- if (msg->url->len == 0) {
- msg->url = rspamd_fstring_append (msg->url, "/check", strlen ("/check"));
- }
-
- if (m->settings_id != NULL) {
- rspamd_http_message_remove_header (msg, "Settings-ID");
- rspamd_http_message_add_header (msg, "Settings-ID", m->settings_id);
- }
-
- bk_conn->backend_conn = rspamd_http_connection_new (NULL,
- proxy_backend_mirror_error_handler,
- proxy_backend_mirror_finish_handler,
- RSPAMD_HTTP_CLIENT_SIMPLE,
- RSPAMD_HTTP_CLIENT,
- session->ctx->keys_cache,
- NULL);
-
- if (m->key) {
- rspamd_http_connection_set_key (bk_conn->backend_conn,
- session->ctx->local_key);
- msg->peer_key = rspamd_pubkey_ref (m->key);
- }
-
- if (m->local ||
- rspamd_inet_address_is_local (
- rspamd_upstream_addr (bk_conn->up), FALSE)) {
-
- if (session->fname) {
- rspamd_http_message_add_header (msg, "File", session->fname);
- }
-
- msg->method = HTTP_GET;
- rspamd_http_connection_write_message_shared (bk_conn->backend_conn,
- msg, NULL, NULL, bk_conn,
- bk_conn->backend_sock,
- bk_conn->io_tv, session->ctx->ev_base);
- }
- else {
- if (session->fname) {
- msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
- rspamd_http_message_set_body (msg, session->map, session->map_len);
- }
-
- msg->method = HTTP_POST;
-
- if (m->compress) {
- proxy_request_compress (msg);
-
- if (session->client_milter_conn) {
- rspamd_http_message_add_header (msg, "Content-Type",
- "application/octet-stream");
- }
- }
- else {
- if (session->client_milter_conn) {
- rspamd_http_message_add_header (msg, "Content-Type",
- "text/plain");
- }
- }
-
- rspamd_http_connection_write_message (bk_conn->backend_conn,
- msg, NULL, NULL, bk_conn,
- bk_conn->backend_sock,
- bk_conn->io_tv, session->ctx->ev_base);
- }
-
- g_ptr_array_add (session->mirror_conns, bk_conn);
- REF_RETAIN (session);
- msg_info_session ("send request to %s", m->name);
- }
- }
-
- static void
- proxy_client_write_error (struct rspamd_proxy_session *session, gint code,
- const gchar *status)
- {
- struct rspamd_http_message *reply;
-
- if (session->client_milter_conn) {
- rspamd_milter_send_action (session->client_milter_conn,
- RSPAMD_MILTER_TEMPFAIL);
- REF_RELEASE (session);
- }
- else {
- reply = rspamd_http_new_message (HTTP_RESPONSE);
- reply->code = code;
- reply->status = rspamd_fstring_new_init (status, strlen (status));
- rspamd_http_connection_write_message (session->client_conn,
- reply, NULL, NULL, session, session->client_sock,
- &session->ctx->io_tv, session->ctx->ev_base);
- }
- }
-
- static void
- proxy_backend_master_error_handler (struct rspamd_http_connection *conn, GError *err)
- {
- struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
- struct rspamd_proxy_session *session;
-
- session = bk_conn->s;
- msg_info_session ("abnormally closing connection from backend: %s, error: %e,"
- " retries left: %d",
- rspamd_inet_address_to_string (rspamd_upstream_addr (session->master_conn->up)),
- err,
- session->ctx->max_retries - session->retries);
- session->retries ++;
- rspamd_upstream_fail (bk_conn->up, FALSE);
- proxy_backend_close_connection (session->master_conn);
-
- if (session->ctx->max_retries &&
- session->retries > session->ctx->max_retries) {
- msg_err_session ("cannot connect to upstream, maximum retries "
- "has been reached: %d", session->retries);
- /* Terminate session immediately */
- proxy_client_write_error (session, err->code, err->message);
- }
- else {
- if (!proxy_send_master_message (session)) {
- proxy_client_write_error (session, err->code, err->message);
- }
- else {
- msg_info_session ("retry connection to: %s"
- " retries left: %d",
- rspamd_inet_address_to_string (
- rspamd_upstream_addr (session->master_conn->up)),
- session->ctx->max_retries - session->retries);
- }
- }
- }
-
- static gint
- proxy_backend_master_finish_handler (struct rspamd_http_connection *conn,
- struct rspamd_http_message *msg)
- {
- struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
- struct rspamd_proxy_session *session, *nsession;
- rspamd_fstring_t *reply;
-
- session = bk_conn->s;
- rspamd_http_connection_steal_msg (session->master_conn->backend_conn);
- proxy_request_decompress (msg);
-
- rspamd_http_message_remove_header (msg, "Content-Length");
- rspamd_http_message_remove_header (msg, "Key");
- rspamd_http_connection_reset (session->master_conn->backend_conn);
-
- if (!proxy_backend_parse_results (session, bk_conn, session->ctx->lua_state,
- bk_conn->parser_from_ref, msg->body_buf.begin, msg->body_buf.len)) {
- msg_warn_session ("cannot parse results from the master backend");
- }
-
-
- if (session->legacy_support > LEGACY_SUPPORT_NO) {
- /* We need to reformat ucl to fit with legacy spamc protocol */
- if (bk_conn->results) {
- reply = rspamd_fstring_new ();
-
- if (session->legacy_support == LEGACY_SUPPORT_SPAMC) {
- rspamd_ucl_tospamc_output (bk_conn->results, &reply);
- msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
- }
- else {
- rspamd_ucl_torspamc_output (bk_conn->results, &reply);
- }
-
- rspamd_http_message_set_body_from_fstring_steal (msg, reply);
- msg->method = HTTP_SYMBOLS;
- }
- else {
- msg_warn_session ("cannot parse results from the master backend, "
- "return them as is");
- }
- }
-
- rspamd_upstream_ok (bk_conn->up);
-
- if (session->client_milter_conn) {
- nsession = proxy_session_refresh (session);
- rspamd_milter_send_task_results (nsession->client_milter_conn,
- session->master_conn->results);
- REF_RELEASE (session);
- rspamd_http_message_free (msg);
- }
- else {
- rspamd_http_connection_write_message (session->client_conn,
- msg, NULL, NULL, session, session->client_sock,
- bk_conn->io_tv, session->ctx->ev_base);
- }
-
- return 0;
- }
-
- static void
- rspamd_proxy_scan_self_reply (struct rspamd_task *task)
- {
- struct rspamd_http_message *msg;
- struct rspamd_proxy_session *session = task->fin_arg, *nsession;
- ucl_object_t *rep = NULL;
- const char *ctype = "application/json";
-
- msg = rspamd_http_new_message (HTTP_RESPONSE);
- msg->date = time (NULL);
- msg->code = 200;
-
- switch (task->cmd) {
- case CMD_REPORT_IFSPAM:
- case CMD_REPORT:
- case CMD_CHECK:
- case CMD_SYMBOLS:
- case CMD_PROCESS:
- case CMD_SKIP:
- case CMD_CHECK_V2:
- rspamd_task_set_finish_time (task);
- rspamd_protocol_http_reply (msg, task, &rep);
- rspamd_protocol_write_log_pipe (task);
- break;
- case CMD_PING:
- rspamd_http_message_set_body (msg, "pong" CRLF, 6);
- ctype = "text/plain";
- break;
- case CMD_OTHER:
- msg_err_task ("BROKEN");
- break;
- }
-
- session->master_conn->flags |= RSPAMD_BACKEND_CLOSED;
-
- if (rep) {
- session->master_conn->results = ucl_object_ref (rep);
- }
-
- if (session->client_milter_conn) {
- nsession = proxy_session_refresh (session);
- rspamd_milter_send_task_results (nsession->client_milter_conn,
- session->master_conn->results);
- rspamd_http_message_free (msg);
- REF_RELEASE (session);
- }
- else {
- rspamd_http_connection_reset (session->client_conn);
- rspamd_http_connection_write_message (session->client_conn,
- msg,
- NULL,
- ctype,
- session,
- session->client_sock,
- NULL,
- session->ctx->ev_base);
- }
- }
-
- static gboolean
- rspamd_proxy_task_fin (void *ud)
- {
- struct rspamd_task *task = ud;
-
- msg_debug_task ("finish task");
-
- if (RSPAMD_TASK_IS_PROCESSED (task)) {
- rspamd_proxy_scan_self_reply (task);
- return TRUE;
- }
-
- if (!rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL)) {
- rspamd_proxy_scan_self_reply (task);
- return TRUE;
- }
-
- if (RSPAMD_TASK_IS_PROCESSED (task)) {
- rspamd_proxy_scan_self_reply (task);
- return TRUE;
- }
-
- /* One more iteration */
- return FALSE;
- }
-
- static gboolean
- rspamd_proxy_self_scan (struct rspamd_proxy_session *session)
- {
- struct rspamd_task *task;
- struct rspamd_http_message *msg;
- const gchar *data;
- gsize len;
-
- msg = session->client_message;
- task = rspamd_task_new (session->worker, session->ctx->cfg,
- session->pool, session->ctx->lang_det,
- session->ctx->ev_base);
- task->flags |= RSPAMD_TASK_FLAG_MIME;
- task->sock = -1;
-
- if (session->client_milter_conn) {
- task->client_addr = rspamd_inet_address_copy (
- session->client_milter_conn->addr);
- }
- else {
- task->client_addr = rspamd_inet_address_copy (session->client_addr);
- }
-
- task->fin_arg = session;
- task->resolver = session->ctx->resolver;
- /* TODO: allow to disable autolearn in protocol */
- task->flags |= RSPAMD_TASK_FLAG_LEARN_AUTO;
- task->s = rspamd_session_create (task->task_pool, rspamd_proxy_task_fin,
- NULL, (event_finalizer_t )rspamd_task_free, task);
- data = rspamd_http_message_get_body (msg, &len);
-
- if (session->backend->settings_id) {
- rspamd_http_message_remove_header (msg, "Settings-ID");
- rspamd_http_message_add_header (msg, "Settings-ID",
- session->backend->settings_id);
- }
-
- /* Process message */
- if (!rspamd_protocol_handle_request (task, msg)) {
- msg_err_task ("cannot handle request: %e", task->err);
- task->flags |= RSPAMD_TASK_FLAG_SKIP;
- }
- else {
- if (task->cmd == CMD_PING) {
- task->flags |= RSPAMD_TASK_FLAG_SKIP;
- }
- else {
- if (!rspamd_task_load_message (task, msg, data, len)) {
- msg_err_task ("cannot load message: %e", task->err);
- task->flags |= RSPAMD_TASK_FLAG_SKIP;
- }
- }
- }
-
- /* Set global timeout for the task */
- if (session->ctx->default_upstream->timeout > 0.0) {
- struct timeval task_tv;
-
- event_set (&task->timeout_ev, -1, EV_TIMEOUT, rspamd_task_timeout,
- task);
- event_base_set (session->ctx->ev_base, &task->timeout_ev);
- double_to_tv (session->ctx->default_upstream->timeout, &task_tv);
- event_add (&task->timeout_ev, &task_tv);
- }
-
- session->master_conn->task = task;
- rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL);
-
- rspamd_session_pending (task->s);
-
- return TRUE;
- }
-
- static gboolean
- proxy_send_master_message (struct rspamd_proxy_session *session)
- {
- struct rspamd_http_message *msg;
- struct rspamd_http_upstream *backend = NULL;
- const rspamd_ftok_t *host;
- GError *err = NULL;
- gchar hostbuf[512];
-
- host = rspamd_http_message_find_header (session->client_message, "Host");
-
- if (host == NULL) {
- backend = session->ctx->default_upstream;
- }
- else {
- rspamd_strlcpy (hostbuf, host->begin, MIN(host->len + 1, sizeof (hostbuf)));
- backend = g_hash_table_lookup (session->ctx->upstreams, hostbuf);
-
- if (backend == NULL) {
- backend = session->ctx->default_upstream;
- }
- }
-
- if (backend == NULL) {
- /* No backend */
- msg_err_session ("cannot find upstream for %s", host ? hostbuf : "default");
- goto err;
- }
- else {
- session->backend = backend;
-
- if (backend->self_scan) {
- return rspamd_proxy_self_scan (session);
- }
- retry:
- if (session->ctx->max_retries &&
- session->retries > session->ctx->max_retries) {
- msg_err_session ("cannot connect to upstream, maximum retries "
- "has been reached: %d", session->retries);
- goto err;
- }
-
- session->master_conn->up = rspamd_upstream_get (backend->u,
- RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
- session->master_conn->io_tv = &backend->io_tv;
-
- if (session->master_conn->up == NULL) {
- msg_err_session ("cannot select upstream for %s",
- host ? hostbuf : "default");
- goto err;
- }
-
- session->master_conn->backend_sock = rspamd_inet_address_connect (
- rspamd_upstream_addr (session->master_conn->up),
- SOCK_STREAM, TRUE);
-
- if (session->master_conn->backend_sock == -1) {
- msg_err_session ("cannot connect upstream: %s(%s)",
- host ? hostbuf : "default",
- rspamd_inet_address_to_string (rspamd_upstream_addr (
- session->master_conn->up)));
- rspamd_upstream_fail (session->master_conn->up, TRUE);
- session->retries ++;
- goto retry;
- }
-
- msg = rspamd_http_connection_copy_msg (session->client_message, &err);
- if (msg == NULL) {
- msg_err_session ("cannot copy message to send it to the upstream: %e",
- err);
-
- if (err) {
- g_error_free (err);
- }
-
- goto err; /* No fallback here */
- }
-
- session->master_conn->backend_conn = rspamd_http_connection_new (
- NULL,
- proxy_backend_master_error_handler,
- proxy_backend_master_finish_handler,
- RSPAMD_HTTP_CLIENT_SIMPLE,
- RSPAMD_HTTP_CLIENT,
- session->ctx->keys_cache,
- NULL);
- session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED;
- session->master_conn->parser_from_ref = backend->parser_from_ref;
- session->master_conn->parser_to_ref = backend->parser_to_ref;
-
- if (backend->key) {
- msg->peer_key = rspamd_pubkey_ref (backend->key);
- rspamd_http_connection_set_key (session->master_conn->backend_conn,
- session->ctx->local_key);
- }
-
- if (backend->settings_id != NULL) {
- rspamd_http_message_remove_header (msg, "Settings-ID");
- rspamd_http_message_add_header (msg, "Settings-ID",
- backend->settings_id);
- }
-
- if (backend->local ||
- rspamd_inet_address_is_local (
- rspamd_upstream_addr (session->master_conn->up), FALSE)) {
-
- if (session->fname) {
- rspamd_http_message_add_header (msg, "File", session->fname);
- }
-
- msg->method = HTTP_GET;
-
- rspamd_http_connection_write_message_shared (
- session->master_conn->backend_conn,
- msg, NULL, NULL, session->master_conn,
- session->master_conn->backend_sock,
- session->master_conn->io_tv, session->ctx->ev_base);
- }
- else {
- if (session->fname) {
- msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
- rspamd_http_message_set_body (msg,
- session->map, session->map_len);
- }
-
- msg->method = HTTP_POST;
-
- if (backend->compress) {
- proxy_request_compress (msg);
- if (session->client_milter_conn) {
- rspamd_http_message_add_header (msg, "Content-Type",
- "application/octet-stream");
- }
- }
- else {
- if (session->client_milter_conn) {
- rspamd_http_message_add_header (msg, "Content-Type",
- "text/plain");
- }
- }
-
- rspamd_http_connection_write_message (
- session->master_conn->backend_conn,
- msg, NULL, NULL, session->master_conn,
- session->master_conn->backend_sock,
- session->master_conn->io_tv, session->ctx->ev_base);
- }
- }
-
- return TRUE;
-
- err:
- if (session->client_milter_conn) {
- rspamd_milter_send_action (session->client_milter_conn,
- RSPAMD_MILTER_TEMPFAIL);
- REF_RELEASE (session);
- }
- else {
- rspamd_http_connection_steal_msg (session->client_conn);
- rspamd_http_connection_reset (session->client_conn);
- proxy_client_write_error (session, 404, "Backend not found");
- }
-
- return FALSE;
- }
-
- static void
- proxy_client_error_handler (struct rspamd_http_connection *conn, GError *err)
- {
- struct rspamd_proxy_session *session = conn->ud;
-
- msg_info_session ("abnormally closing connection from: %s, error: %s",
- rspamd_inet_address_to_string (session->client_addr), err->message);
- /* Terminate session immediately */
- proxy_backend_close_connection (session->master_conn);
- REF_RELEASE (session);
- }
-
- static gint
- proxy_client_finish_handler (struct rspamd_http_connection *conn,
- struct rspamd_http_message *msg)
- {
- struct rspamd_proxy_session *session = conn->ud;
-
- if (!session->master_conn) {
- session->master_conn = rspamd_mempool_alloc0 (session->pool,
- sizeof (*session->master_conn));
- session->master_conn->s = session;
- session->master_conn->name = "master";
-
- /* Reset spamc legacy */
- if (msg->method >= HTTP_SYMBOLS) {
- msg->method = HTTP_POST;
-
- if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) {
- session->legacy_support = LEGACY_SUPPORT_SPAMC;
- msg_info_session ("enabling legacy spamc mode for session");
- }
- else {
- session->legacy_support = LEGACY_SUPPORT_RSPAMC;
- msg_info_session ("enabling legacy rspamc mode for session");
- }
- }
-
- if (msg->url->len == 0) {
- msg->url = rspamd_fstring_append (msg->url,
- "/" MSG_CMD_CHECK_V2, strlen ("/" MSG_CMD_CHECK_V2));
- }
-
- if (!proxy_check_file (msg, session)) {
- goto err;
- }
-
- session->client_message = rspamd_http_connection_steal_msg (
- session->client_conn);
- session->shmem_ref = rspamd_http_message_shmem_ref (session->client_message);
- rspamd_http_message_remove_header (msg, "Content-Length");
- rspamd_http_message_remove_header (msg, "Transfer-Encoding");
- rspamd_http_message_remove_header (msg, "Keep-Alive");
- rspamd_http_message_remove_header (msg, "Connection");
- rspamd_http_message_remove_header (msg, "Key");
-
- proxy_open_mirror_connections (session);
- rspamd_http_connection_reset (session->client_conn);
-
- proxy_send_master_message (session);
- }
- else {
- msg_info_session ("finished master connection");
- proxy_backend_close_connection (session->master_conn);
- REF_RELEASE (session);
- }
-
- return 0;
-
- err:
- rspamd_http_connection_steal_msg (session->client_conn);
- rspamd_http_message_remove_header (msg, "Content-Length");
- rspamd_http_message_remove_header (msg, "Key");
- rspamd_http_message_remove_header (msg, "Transfer-Encoding");
- rspamd_http_message_remove_header (msg, "Keep-Alive");
- rspamd_http_message_remove_header (msg, "Connection");
- rspamd_http_connection_reset (session->client_conn);
- proxy_client_write_error (session, 404, "Backend not found");
-
- return 0;
- }
-
- static void
- proxy_milter_finish_handler (gint fd,
- struct rspamd_milter_session *rms,
- void *ud)
- {
- struct rspamd_proxy_session *session = ud;
- struct rspamd_http_message *msg;
-
- session->client_milter_conn = rms;
-
- if (rms->message == NULL || rms->message->len == 0) {
- msg_info_session ("finished milter connection");
- proxy_backend_close_connection (session->master_conn);
- REF_RELEASE (session);
- }
- else {
- if (!session->master_conn) {
- session->master_conn = rspamd_mempool_alloc0 (session->pool,
- sizeof (*session->master_conn));
- }
-
- msg = rspamd_milter_to_http (rms);
- session->master_conn->s = session;
- session->master_conn->name = "master";
- session->client_message = msg;
-
- proxy_open_mirror_connections (session);
- proxy_send_master_message (session);
- }
- }
-
- static void
- proxy_milter_error_handler (gint fd,
- struct rspamd_milter_session *rms,
- void *ud, GError *err)
- {
- struct rspamd_proxy_session *session = ud;
-
- msg_info_session ("abnormally closing milter connection from: %s, "
- "error: %s", rspamd_inet_address_to_string (session->client_addr),
- err->message);
- /* Terminate session immediately */
- proxy_backend_close_connection (session->master_conn);
- REF_RELEASE (session);
- }
-
- static void
- proxy_accept_socket (gint fd, short what, void *arg)
- {
- struct rspamd_worker *worker = (struct rspamd_worker *) arg;
- struct rspamd_proxy_ctx *ctx;
- rspamd_inet_addr_t *addr;
- struct rspamd_proxy_session *session;
- gint nfd;
-
- ctx = worker->ctx;
-
- if ((nfd =
- rspamd_accept_from_socket (fd, &addr, worker->accept_events)) == -1) {
- msg_warn ("accept failed: %s", strerror (errno));
- return;
- }
- /* Check for EAGAIN */
- if (nfd == 0) {
- return;
- }
-
- session = g_malloc0 (sizeof (*session));
- REF_INIT_RETAIN (session, proxy_session_dtor);
- session->client_sock = nfd;
- session->client_addr = addr;
- session->mirror_conns = g_ptr_array_sized_new (ctx->mirrors->len);
-
- session->pool = rspamd_mempool_new (rspamd_mempool_suggest_size (),
- "proxy");
- session->ctx = ctx;
- session->worker = worker;
-
- if (ctx->sessions_cache) {
- rspamd_worker_session_cache_add (ctx->sessions_cache,
- session->pool->tag.uid, &session->ref.refcount, session);
- }
-
- if (!ctx->milter) {
- session->client_conn = rspamd_http_connection_new (NULL,
- proxy_client_error_handler,
- proxy_client_finish_handler,
- 0,
- RSPAMD_HTTP_SERVER,
- ctx->keys_cache,
- NULL);
-
- if (ctx->key) {
- rspamd_http_connection_set_key (session->client_conn, ctx->key);
- }
-
- msg_info_session ("accepted http connection from %s port %d",
- rspamd_inet_address_to_string (addr),
- rspamd_inet_address_get_port (addr));
-
- rspamd_http_connection_read_message_shared (session->client_conn,
- session,
- nfd,
- &ctx->io_tv,
- ctx->ev_base);
- }
- else {
- msg_info_session ("accepted milter connection from %s port %d",
- rspamd_inet_address_to_string (addr),
- rspamd_inet_address_get_port (addr));
-
- #ifdef TCP_NODELAY
-
- #ifndef SOL_TCP
- #define SOL_TCP IPPROTO_TCP
- #endif
-
- if (rspamd_inet_address_get_af (addr) != AF_UNIX) {
- gint sopt = 1;
-
- if (setsockopt (nfd, SOL_TCP, TCP_NODELAY, &sopt, sizeof (sopt)) ==
- -1) {
- msg_warn_session ("cannot set TCP_NODELAY: %s",
- strerror (errno));
- }
- }
- #endif
-
- rspamd_milter_handle_socket (nfd, NULL,
- session->pool,
- ctx->ev_base,
- proxy_milter_finish_handler,
- proxy_milter_error_handler,
- session);
- }
- }
-
- static void
- proxy_rotate_key (gint fd, short what, void *arg)
- {
- struct timeval rot_tv;
- struct rspamd_proxy_ctx *ctx = arg;
- gpointer kp;
-
- double_to_tv (ctx->rotate_tm, &rot_tv);
- rot_tv.tv_sec += ottery_rand_range (rot_tv.tv_sec);
- event_del (&ctx->rotate_ev);
- event_add (&ctx->rotate_ev, &rot_tv);
-
- kp = ctx->local_key;
- ctx->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
- RSPAMD_CRYPTOBOX_MODE_25519);
- rspamd_keypair_unref (kp);
- }
-
- static void
- adjust_upstreams_limits (struct rspamd_proxy_ctx *ctx)
- {
- struct rspamd_http_upstream *backend;
- gpointer k, v;
- GHashTableIter it;
-
- /*
- * We set error time equal to max_retries * backend_timeout and max_errors
- * to max_retries - 1
- *
- * So if we failed to scan a message on a backend for some reasons, we
- * will try to re-resolve it faster
- */
-
- g_hash_table_iter_init (&it, ctx->upstreams);
-
- while (g_hash_table_iter_next (&it, &k, &v)) {
- backend = (struct rspamd_http_upstream *)v;
-
- if (!backend->self_scan && backend->u) {
- rspamd_upstreams_set_limits (backend->u,
- NAN, NAN, ctx->max_retries * backend->timeout, NAN,
- ctx->max_retries - 1, 0);
- }
- }
- }
-
- void
- start_rspamd_proxy (struct rspamd_worker *worker) {
- struct rspamd_proxy_ctx *ctx = worker->ctx;
- struct timeval rot_tv;
-
- ctx->cfg = worker->srv->cfg;
- ctx->ev_base = rspamd_prepare_worker (worker, "rspamd_proxy",
- proxy_accept_socket);
-
- ctx->resolver = dns_resolver_init (worker->srv->logger,
- ctx->ev_base,
- worker->srv->cfg);
- double_to_tv (ctx->timeout, &ctx->io_tv);
- rspamd_map_watch (worker->srv->cfg, ctx->ev_base, ctx->resolver, worker, 0);
-
- rspamd_upstreams_library_config (worker->srv->cfg, ctx->cfg->ups_ctx,
- ctx->ev_base, ctx->resolver->r);
-
- /* XXX: stupid default */
- ctx->keys_cache = rspamd_keypair_cache_new (256);
- ctx->local_key = rspamd_keypair_new (RSPAMD_KEYPAIR_KEX,
- RSPAMD_CRYPTOBOX_MODE_25519);
-
- double_to_tv (ctx->rotate_tm, &rot_tv);
- rot_tv.tv_sec += ottery_rand_range (rot_tv.tv_sec);
- event_set (&ctx->rotate_ev, -1, EV_TIMEOUT, proxy_rotate_key, ctx);
- event_base_set (ctx->ev_base, &ctx->rotate_ev);
- event_add (&ctx->rotate_ev, &rot_tv);
-
- if (ctx->has_self_scan) {
- /* Additional initialisation needed */
- rspamd_worker_init_scanner (worker, ctx->ev_base, ctx->resolver,
- &ctx->lang_det);
- }
-
- if (worker->srv->cfg->enable_sessions_cache) {
- ctx->sessions_cache = rspamd_worker_session_cache_new (worker,
- ctx->ev_base);
- }
-
- ctx->milter_ctx.spam_header = ctx->spam_header;
- ctx->milter_ctx.discard_on_reject = ctx->discard_on_reject;
- ctx->milter_ctx.quarantine_on_reject = ctx->quarantine_on_reject;
- ctx->milter_ctx.sessions_cache = ctx->sessions_cache;
- ctx->milter_ctx.client_ca_name = ctx->client_ca_name;
- ctx->milter_ctx.reject_message = ctx->reject_message;
- rspamd_milter_init_library (&ctx->milter_ctx);
-
- rspamd_lua_run_postloads (ctx->cfg->lua_state, ctx->cfg, ctx->ev_base,
- worker);
- adjust_upstreams_limits (ctx);
-
- event_base_loop (ctx->ev_base, 0);
- rspamd_worker_block_signals ();
-
- if (ctx->has_self_scan) {
- rspamd_stat_close ();
- }
-
- rspamd_keypair_cache_destroy (ctx->keys_cache);
- REF_RELEASE (ctx->cfg);
- rspamd_log_close (worker->srv->logger, TRUE);
-
- exit (EXIT_SUCCESS);
- }
|