You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd_proxy.c 65KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475
  1. /*
  2. * Copyright 2024 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "libutil/util.h"
  18. #include "libserver/maps/map.h"
  19. #include "libutil/upstream.h"
  20. #include "libserver/http/http_connection.h"
  21. #include "libserver/http/http_private.h"
  22. #include "libserver/protocol.h"
  23. #include "libserver/protocol_internal.h"
  24. #include "libserver/cfg_file.h"
  25. #include "libserver/url.h"
  26. #include "libserver/dns.h"
  27. #include "libmime/message.h"
  28. #include "rspamd.h"
  29. #include "libserver/worker_util.h"
  30. #include "worker_private.h"
  31. #include "lua/lua_common.h"
  32. #include "keypairs_cache.h"
  33. #include "libstat/stat_api.h"
  34. #include "ottery.h"
  35. #include "unix-std.h"
  36. #include "libserver/milter.h"
  37. #include "libserver/milter_internal.h"
  38. #include "libmime/lang_detection.h"
  39. #include <math.h>
  40. #ifdef HAVE_NETINET_TCP_H
  41. #include <netinet/tcp.h> /* for TCP_NODELAY */
  42. #endif
  43. #ifdef SYS_ZSTD
  44. #include "zstd.h"
  45. #else
  46. #include "contrib/zstd/zstd.h"
  47. #endif
  48. /* Rotate keys each minute by default */
  49. #define DEFAULT_ROTATION_TIME 60.0
  50. #define DEFAULT_RETRIES 5
  51. #define msg_err_session(...) rspamd_default_log_function(G_LOG_LEVEL_CRITICAL, \
  52. session->pool->tag.tagname, session->pool->tag.uid, \
  53. RSPAMD_LOG_FUNC, \
  54. __VA_ARGS__)
  55. #define msg_warn_session(...) rspamd_default_log_function(G_LOG_LEVEL_WARNING, \
  56. session->pool->tag.tagname, session->pool->tag.uid, \
  57. RSPAMD_LOG_FUNC, \
  58. __VA_ARGS__)
  59. #define msg_info_session(...) rspamd_default_log_function(G_LOG_LEVEL_INFO, \
  60. session->pool->tag.tagname, session->pool->tag.uid, \
  61. RSPAMD_LOG_FUNC, \
  62. __VA_ARGS__)
  63. #define msg_debug_session(...) rspamd_conditional_debug_fast(NULL, session->client_addr, \
  64. rspamd_proxy_log_id, "proxy", session->pool->tag.uid, \
  65. RSPAMD_LOG_FUNC, \
  66. __VA_ARGS__)
  67. INIT_LOG_MODULE(proxy)
  68. gpointer init_rspamd_proxy(struct rspamd_config *cfg);
  69. void start_rspamd_proxy(struct rspamd_worker *worker);
  70. worker_t rspamd_proxy_worker = {
  71. "rspamd_proxy", /* Name */
  72. init_rspamd_proxy, /* Init function */
  73. start_rspamd_proxy, /* Start function */
  74. RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE | RSPAMD_WORKER_SCANNER,
  75. RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */
  76. RSPAMD_WORKER_VER};
  77. struct rspamd_http_upstream {
  78. gchar *name;
  79. gchar *settings_id;
  80. struct upstream_list *u;
  81. struct rspamd_cryptobox_pubkey *key;
  82. gdouble timeout;
  83. gint parser_from_ref;
  84. gint parser_to_ref;
  85. gboolean local;
  86. gboolean self_scan;
  87. gboolean compress;
  88. };
  89. struct rspamd_http_mirror {
  90. gchar *name;
  91. gchar *settings_id;
  92. struct upstream_list *u;
  93. struct rspamd_cryptobox_pubkey *key;
  94. gdouble prob;
  95. gdouble timeout;
  96. gint parser_from_ref;
  97. gint parser_to_ref;
  98. gboolean local;
  99. gboolean compress;
  100. };
  101. static const guint64 rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL;
  102. struct rspamd_proxy_ctx {
  103. guint64 magic;
  104. /* Events base */
  105. struct ev_loop *event_loop;
  106. /* DNS resolver */
  107. struct rspamd_dns_resolver *resolver;
  108. /* Config */
  109. struct rspamd_config *cfg;
  110. /* END OF COMMON PART */
  111. gdouble timeout;
  112. /* Encryption key for clients */
  113. struct rspamd_cryptobox_keypair *key;
  114. /* HTTP context */
  115. struct rspamd_http_context *http_ctx;
  116. /* Upstreams to use */
  117. GHashTable *upstreams;
  118. /* Mirrors to send traffic to */
  119. GPtrArray *mirrors;
  120. /* Default upstream */
  121. struct rspamd_http_upstream *default_upstream;
  122. lua_State *lua_state;
  123. /* Array of callback functions called on end of scan to compare results */
  124. GArray *cmp_refs;
  125. /* Maximum count for retries */
  126. guint max_retries;
  127. gboolean encrypted_only;
  128. /* If we have self_scanning backends, we need to work as a normal worker */
  129. gboolean has_self_scan;
  130. /* It is not HTTP but milter proxy */
  131. gboolean milter;
  132. /* Discard messages instead of rejecting them */
  133. gboolean discard_on_reject;
  134. /* Quarantine messages instead of rejecting them */
  135. gboolean quarantine_on_reject;
  136. /* Milter spam header */
  137. gchar *spam_header;
  138. /* CA name that can be used for client certificates */
  139. gchar *client_ca_name;
  140. /* Milter rejection message */
  141. gchar *reject_message;
  142. /* Sessions cache */
  143. void *sessions_cache;
  144. struct rspamd_milter_context milter_ctx;
  145. /* Language detector */
  146. struct rspamd_lang_detector *lang_det;
  147. gdouble task_timeout;
  148. };
  149. enum rspamd_backend_flags {
  150. RSPAMD_BACKEND_REPLIED = 1 << 0,
  151. RSPAMD_BACKEND_CLOSED = 1 << 1,
  152. RSPAMD_BACKEND_PARSED = 1 << 2,
  153. };
  154. struct rspamd_proxy_session;
  155. struct rspamd_proxy_backend_connection {
  156. const gchar *name;
  157. struct rspamd_cryptobox_keypair *local_key;
  158. struct rspamd_cryptobox_pubkey *remote_key;
  159. struct upstream *up;
  160. struct rspamd_http_connection *backend_conn;
  161. ucl_object_t *results;
  162. const gchar *err;
  163. struct rspamd_proxy_session *s;
  164. gint backend_sock;
  165. ev_tstamp timeout;
  166. enum rspamd_backend_flags flags;
  167. gint parser_from_ref;
  168. gint parser_to_ref;
  169. struct rspamd_task *task;
  170. };
  171. enum rspamd_proxy_legacy_support {
  172. LEGACY_SUPPORT_NO = 0,
  173. LEGACY_SUPPORT_RSPAMC,
  174. LEGACY_SUPPORT_SPAMC
  175. };
  176. struct rspamd_proxy_session {
  177. struct rspamd_worker *worker;
  178. rspamd_mempool_t *pool;
  179. struct rspamd_proxy_ctx *ctx;
  180. rspamd_inet_addr_t *client_addr;
  181. struct rspamd_http_connection *client_conn;
  182. struct rspamd_milter_session *client_milter_conn;
  183. struct rspamd_http_upstream *backend;
  184. gpointer map;
  185. gchar *fname;
  186. gpointer shmem_ref;
  187. struct rspamd_proxy_backend_connection *master_conn;
  188. struct rspamd_http_message *client_message;
  189. GPtrArray *mirror_conns;
  190. gsize map_len;
  191. gint client_sock;
  192. enum rspamd_proxy_legacy_support legacy_support;
  193. gint retries;
  194. ref_entry_t ref;
  195. };
  196. static gboolean proxy_send_master_message(struct rspamd_proxy_session *session);
  197. static GQuark
  198. rspamd_proxy_quark(void)
  199. {
  200. return g_quark_from_static_string("rspamd-proxy");
  201. }
  202. static gboolean
  203. rspamd_proxy_parse_lua_parser(lua_State *L, const ucl_object_t *obj,
  204. gint *ref_from, gint *ref_to, GError **err)
  205. {
  206. const gchar *lua_script;
  207. gsize slen;
  208. gint err_idx, ref_idx;
  209. gboolean has_ref = FALSE;
  210. g_assert(obj != NULL);
  211. g_assert(ref_from != NULL);
  212. g_assert(ref_to != NULL);
  213. *ref_from = -1;
  214. *ref_to = -1;
  215. lua_script = ucl_object_tolstring(obj, &slen);
  216. lua_pushcfunction(L, &rspamd_lua_traceback);
  217. err_idx = lua_gettop(L);
  218. /* Load data */
  219. if (luaL_loadbuffer(L, lua_script, slen, "proxy parser") != 0) {
  220. g_set_error(err,
  221. rspamd_proxy_quark(),
  222. EINVAL,
  223. "cannot load lua parser script: %s",
  224. lua_tostring(L, -1));
  225. lua_settop(L, 0); /* Error function */
  226. return FALSE;
  227. }
  228. /* Now do it */
  229. if (lua_pcall(L, 0, 1, err_idx) != 0) {
  230. g_set_error(err,
  231. rspamd_proxy_quark(),
  232. EINVAL,
  233. "cannot init lua parser script: %s",
  234. lua_tostring(L, -1));
  235. lua_settop(L, 0);
  236. return FALSE;
  237. }
  238. if (lua_istable(L, -1)) {
  239. /*
  240. * We have a table, so we check for two keys:
  241. * 'from' -> function
  242. * 'to' -> function
  243. *
  244. * From converts parent request to a client one
  245. * To converts client request to a parent one
  246. */
  247. lua_pushstring(L, "from");
  248. lua_gettable(L, -2);
  249. if (lua_isfunction(L, -1)) {
  250. ref_idx = luaL_ref(L, LUA_REGISTRYINDEX);
  251. *ref_from = ref_idx;
  252. has_ref = TRUE;
  253. }
  254. lua_pushstring(L, "to");
  255. lua_gettable(L, -2);
  256. if (lua_isfunction(L, -1)) {
  257. ref_idx = luaL_ref(L, LUA_REGISTRYINDEX);
  258. *ref_to = ref_idx;
  259. has_ref = TRUE;
  260. }
  261. }
  262. else if (!lua_isfunction(L, -1)) {
  263. g_set_error(err,
  264. rspamd_proxy_quark(),
  265. EINVAL,
  266. "cannot init lua parser script: "
  267. "must return function");
  268. lua_settop(L, 0);
  269. return FALSE;
  270. }
  271. else {
  272. /* Just parser from protocol */
  273. ref_idx = luaL_ref(L, LUA_REGISTRYINDEX);
  274. *ref_from = ref_idx;
  275. lua_settop(L, 0);
  276. has_ref = TRUE;
  277. }
  278. return has_ref;
  279. }
  280. static gboolean
  281. rspamd_proxy_parse_upstream(rspamd_mempool_t *pool,
  282. const ucl_object_t *obj,
  283. gpointer ud,
  284. struct rspamd_rcl_section *section,
  285. GError **err)
  286. {
  287. const ucl_object_t *elt;
  288. struct rspamd_http_upstream *up = NULL;
  289. struct rspamd_proxy_ctx *ctx;
  290. struct rspamd_rcl_struct_parser *pd = ud;
  291. lua_State *L;
  292. ctx = pd->user_struct;
  293. L = ctx->lua_state;
  294. if (ucl_object_type(obj) != UCL_OBJECT) {
  295. if (ucl_object_type(obj) != UCL_NULL) {
  296. msg_info_pool_check("upstream %s is disabled by setting it to NULL",
  297. ucl_object_key(obj));
  298. return TRUE;
  299. }
  300. g_set_error(err, rspamd_proxy_quark(), 100,
  301. "upstream option must be an object");
  302. return FALSE;
  303. }
  304. if (!rspamd_config_is_enabled_from_ucl(pool, obj)) {
  305. /* Upstream is valid but disabled */
  306. msg_info_pool_check("upstream %s is disabled",
  307. ucl_object_lookup(obj, "name") ? ucl_object_tostring(ucl_object_lookup(obj, "name")) : ucl_object_key(obj));
  308. return TRUE;
  309. }
  310. up = rspamd_mempool_alloc0(pool, sizeof(*up));
  311. elt = ucl_object_lookup(obj, "name");
  312. if (elt == NULL) {
  313. if (ucl_object_key(obj)) {
  314. if (strcmp(ucl_object_key(obj), "upstream") == 0) {
  315. /* Iterate over the object and find upstream elements */
  316. ucl_object_iter_t it = NULL;
  317. const ucl_object_t *cur;
  318. gboolean ret = TRUE;
  319. while ((cur = ucl_object_iterate(obj, &it, true)) != NULL) {
  320. if (!rspamd_proxy_parse_upstream(pool, cur, ud,
  321. section, err)) {
  322. ret = FALSE;
  323. }
  324. }
  325. return ret;
  326. }
  327. else {
  328. /* Inside upstream */
  329. up->name = rspamd_mempool_strdup(pool, ucl_object_key(obj));
  330. }
  331. }
  332. else {
  333. g_set_error(err, rspamd_proxy_quark(), 100,
  334. "upstream option must have some name definition");
  335. return FALSE;
  336. }
  337. }
  338. else {
  339. up->name = rspamd_mempool_strdup(pool, ucl_object_tostring(elt));
  340. }
  341. up->parser_from_ref = -1;
  342. up->parser_to_ref = -1;
  343. up->timeout = ctx->timeout;
  344. elt = ucl_object_lookup(obj, "key");
  345. if (elt != NULL) {
  346. up->key = rspamd_pubkey_from_base32(ucl_object_tostring(elt), 0,
  347. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  348. if (up->key == NULL) {
  349. g_set_error(err, rspamd_proxy_quark(), 100,
  350. "cannot read upstream key");
  351. goto err;
  352. }
  353. rspamd_mempool_add_destructor(pool,
  354. (rspamd_mempool_destruct_t) rspamd_pubkey_unref, up->key);
  355. }
  356. elt = ucl_object_lookup(obj, "self_scan");
  357. if (elt && ucl_object_toboolean(elt)) {
  358. up->self_scan = TRUE;
  359. ctx->has_self_scan = TRUE;
  360. }
  361. elt = ucl_object_lookup_any(obj, "compress", "compression", NULL);
  362. if (elt && ucl_object_toboolean(elt)) {
  363. up->compress = TRUE;
  364. }
  365. elt = ucl_object_lookup(obj, "hosts");
  366. if (elt == NULL && !up->self_scan) {
  367. g_set_error(err, rspamd_proxy_quark(), 100,
  368. "upstream option must have some hosts definition");
  369. goto err;
  370. }
  371. if (elt) {
  372. up->u = rspamd_upstreams_create(ctx->cfg->ups_ctx);
  373. if (!rspamd_upstreams_from_ucl(up->u, elt, 11333, NULL)) {
  374. g_set_error(err, rspamd_proxy_quark(), 100,
  375. "upstream has bad hosts definition");
  376. goto err;
  377. }
  378. rspamd_mempool_add_destructor(pool,
  379. (rspamd_mempool_destruct_t) rspamd_upstreams_destroy, up->u);
  380. }
  381. elt = ucl_object_lookup(obj, "default");
  382. if (elt) {
  383. if (ucl_object_toboolean(elt)) {
  384. ctx->default_upstream = up;
  385. }
  386. }
  387. else if (up->self_scan) {
  388. ctx->default_upstream = up;
  389. }
  390. elt = ucl_object_lookup(obj, "local");
  391. if (elt && ucl_object_toboolean(elt)) {
  392. up->local = TRUE;
  393. }
  394. elt = ucl_object_lookup(obj, "timeout");
  395. if (elt) {
  396. ucl_object_todouble_safe(elt, &up->timeout);
  397. }
  398. elt = ucl_object_lookup_any(obj, "settings", "settings_id", NULL);
  399. if (elt && ucl_object_type(elt) == UCL_STRING) {
  400. up->settings_id = rspamd_mempool_strdup(pool, ucl_object_tostring(elt));
  401. }
  402. /*
  403. * Accept lua function here in form
  404. * fun :: String -> UCL
  405. */
  406. elt = ucl_object_lookup(obj, "parser");
  407. if (elt) {
  408. if (!rspamd_proxy_parse_lua_parser(L, elt, &up->parser_from_ref,
  409. &up->parser_to_ref, err)) {
  410. goto err;
  411. }
  412. rspamd_lua_add_ref_dtor(L, pool, up->parser_from_ref);
  413. rspamd_lua_add_ref_dtor(L, pool, up->parser_to_ref);
  414. }
  415. g_hash_table_insert(ctx->upstreams, up->name, up);
  416. return TRUE;
  417. err:
  418. return FALSE;
  419. }
  420. static gboolean
  421. rspamd_proxy_parse_mirror(rspamd_mempool_t *pool,
  422. const ucl_object_t *obj,
  423. gpointer ud,
  424. struct rspamd_rcl_section *section,
  425. GError **err)
  426. {
  427. const ucl_object_t *elt;
  428. struct rspamd_http_mirror *up = NULL;
  429. struct rspamd_proxy_ctx *ctx;
  430. struct rspamd_rcl_struct_parser *pd = ud;
  431. lua_State *L;
  432. ctx = pd->user_struct;
  433. L = ctx->lua_state;
  434. if (ucl_object_type(obj) != UCL_OBJECT) {
  435. if (ucl_object_type(obj) != UCL_NULL) {
  436. msg_info_pool_check("mirror %s is disabled by setting it to NULL",
  437. ucl_object_key(obj));
  438. return TRUE;
  439. }
  440. g_set_error(err, rspamd_proxy_quark(), 100,
  441. "mirror option must be an object");
  442. return FALSE;
  443. }
  444. if (!rspamd_config_is_enabled_from_ucl(pool, obj)) {
  445. /* Upstream is valid but disabled */
  446. msg_info_pool_check("mirror %s is disabled",
  447. ucl_object_lookup(obj, "name") ? ucl_object_tostring(ucl_object_lookup(obj, "name")) : ucl_object_key(obj));
  448. return TRUE;
  449. }
  450. up = rspamd_mempool_alloc0(pool, sizeof(*up));
  451. elt = ucl_object_lookup(obj, "name");
  452. if (elt == NULL) {
  453. if (ucl_object_key(obj)) {
  454. if (strcmp(ucl_object_key(obj), "mirror") == 0) {
  455. /* Iterate over the object and find upstream elements */
  456. ucl_object_iter_t it = NULL;
  457. const ucl_object_t *cur;
  458. gboolean ret = TRUE;
  459. while ((cur = ucl_object_iterate(obj, &it, true)) != NULL) {
  460. if (!rspamd_proxy_parse_mirror(pool, cur, ud,
  461. section, err)) {
  462. ret = FALSE;
  463. }
  464. }
  465. return ret;
  466. }
  467. else {
  468. /* Inside upstream */
  469. up->name = rspamd_mempool_strdup(pool, ucl_object_key(obj));
  470. }
  471. }
  472. else {
  473. g_set_error(err, rspamd_proxy_quark(), 100,
  474. "mirror option must have some name definition");
  475. return FALSE;
  476. }
  477. }
  478. else {
  479. up->name = rspamd_mempool_strdup(pool, ucl_object_tostring(elt));
  480. }
  481. up->parser_to_ref = -1;
  482. up->parser_from_ref = -1;
  483. up->timeout = ctx->timeout;
  484. elt = ucl_object_lookup(obj, "key");
  485. if (elt != NULL) {
  486. up->key = rspamd_pubkey_from_base32(ucl_object_tostring(elt), 0,
  487. RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519);
  488. if (up->key == NULL) {
  489. g_set_error(err, rspamd_proxy_quark(), 100,
  490. "cannot read mirror key");
  491. goto err;
  492. }
  493. rspamd_mempool_add_destructor(pool,
  494. (rspamd_mempool_destruct_t) rspamd_pubkey_unref, up->key);
  495. }
  496. elt = ucl_object_lookup(obj, "hosts");
  497. if (elt == NULL) {
  498. g_set_error(err, rspamd_proxy_quark(), 100,
  499. "mirror option must have some hosts definition");
  500. goto err;
  501. }
  502. up->u = rspamd_upstreams_create(ctx->cfg->ups_ctx);
  503. if (!rspamd_upstreams_from_ucl(up->u, elt, 11333, NULL)) {
  504. g_set_error(err, rspamd_proxy_quark(), 100,
  505. "mirror has bad hosts definition");
  506. goto err;
  507. }
  508. rspamd_mempool_add_destructor(pool,
  509. (rspamd_mempool_destruct_t) rspamd_upstreams_destroy, up->u);
  510. elt = ucl_object_lookup_any(obj, "probability", "prob", NULL);
  511. if (elt) {
  512. up->prob = ucl_object_todouble(elt);
  513. }
  514. else {
  515. up->prob = 1.0;
  516. }
  517. elt = ucl_object_lookup(obj, "local");
  518. if (elt && ucl_object_toboolean(elt)) {
  519. up->local = TRUE;
  520. }
  521. elt = ucl_object_lookup_any(obj, "compress", "compression", NULL);
  522. if (elt && ucl_object_toboolean(elt)) {
  523. up->compress = TRUE;
  524. }
  525. elt = ucl_object_lookup(obj, "timeout");
  526. if (elt) {
  527. ucl_object_todouble_safe(elt, &up->timeout);
  528. }
  529. /*
  530. * Accept lua function here in form
  531. * fun :: String -> UCL
  532. */
  533. elt = ucl_object_lookup(obj, "parser");
  534. if (elt) {
  535. if (!rspamd_proxy_parse_lua_parser(L, elt, &up->parser_from_ref,
  536. &up->parser_to_ref, err)) {
  537. goto err;
  538. }
  539. rspamd_lua_add_ref_dtor(L, pool, up->parser_from_ref);
  540. rspamd_lua_add_ref_dtor(L, pool, up->parser_to_ref);
  541. }
  542. elt = ucl_object_lookup_any(obj, "settings", "settings_id", NULL);
  543. if (elt && ucl_object_type(elt) == UCL_STRING) {
  544. up->settings_id = rspamd_mempool_strdup(pool, ucl_object_tostring(elt));
  545. }
  546. g_ptr_array_add(ctx->mirrors, up);
  547. return TRUE;
  548. err:
  549. return FALSE;
  550. }
  551. static gboolean
  552. rspamd_proxy_parse_script(rspamd_mempool_t *pool,
  553. const ucl_object_t *obj,
  554. gpointer ud,
  555. struct rspamd_rcl_section *section,
  556. GError **err)
  557. {
  558. struct rspamd_proxy_ctx *ctx;
  559. struct rspamd_rcl_struct_parser *pd = ud;
  560. lua_State *L;
  561. const gchar *lua_script;
  562. gsize slen;
  563. gint err_idx, ref_idx;
  564. struct stat st;
  565. ctx = pd->user_struct;
  566. L = ctx->lua_state;
  567. if (ucl_object_type(obj) != UCL_STRING) {
  568. g_set_error(err, rspamd_proxy_quark(), 100,
  569. "script option must be a string with file or lua chunk");
  570. return FALSE;
  571. }
  572. lua_script = ucl_object_tolstring(obj, &slen);
  573. lua_pushcfunction(L, &rspamd_lua_traceback);
  574. err_idx = lua_gettop(L);
  575. if (stat(lua_script, &st) != -1) {
  576. /* Load file */
  577. if (luaL_loadfile(L, lua_script) != 0) {
  578. g_set_error(err,
  579. rspamd_proxy_quark(),
  580. EINVAL,
  581. "cannot load lua parser script: %s",
  582. lua_tostring(L, -1));
  583. lua_settop(L, 0); /* Error function */
  584. goto err;
  585. }
  586. }
  587. else {
  588. /* Load data directly */
  589. if (luaL_loadbuffer(L, lua_script, slen, "proxy parser") != 0) {
  590. g_set_error(err,
  591. rspamd_proxy_quark(),
  592. EINVAL,
  593. "cannot load lua parser script: %s",
  594. lua_tostring(L, -1));
  595. lua_settop(L, 0); /* Error function */
  596. goto err;
  597. }
  598. }
  599. /* Now do it */
  600. if (lua_pcall(L, 0, 1, err_idx) != 0) {
  601. g_set_error(err,
  602. rspamd_proxy_quark(),
  603. EINVAL,
  604. "cannot init lua parser script: %s",
  605. lua_tostring(L, -1));
  606. lua_settop(L, 0);
  607. goto err;
  608. }
  609. if (!lua_isfunction(L, -1)) {
  610. g_set_error(err,
  611. rspamd_proxy_quark(),
  612. EINVAL,
  613. "cannot init lua parser script: "
  614. "must return function, %s returned",
  615. lua_typename(L, lua_type(L, -1)));
  616. lua_settop(L, 0);
  617. goto err;
  618. }
  619. ref_idx = luaL_ref(L, LUA_REGISTRYINDEX);
  620. lua_settop(L, 0);
  621. g_array_append_val(ctx->cmp_refs, ref_idx);
  622. return TRUE;
  623. err:
  624. return FALSE;
  625. }
  626. gpointer
  627. init_rspamd_proxy(struct rspamd_config *cfg)
  628. {
  629. struct rspamd_proxy_ctx *ctx;
  630. GQuark type;
  631. type = g_quark_try_string("rspamd_proxy");
  632. ctx = rspamd_mempool_alloc0(cfg->cfg_pool,
  633. sizeof(struct rspamd_proxy_ctx));
  634. ctx->magic = rspamd_rspamd_proxy_magic;
  635. ctx->timeout = 120.0;
  636. ctx->upstreams = g_hash_table_new(rspamd_strcase_hash, rspamd_strcase_equal);
  637. rspamd_mempool_add_destructor(cfg->cfg_pool,
  638. (rspamd_mempool_destruct_t) g_hash_table_unref, ctx->upstreams);
  639. ctx->mirrors = g_ptr_array_new();
  640. rspamd_mempool_add_destructor(cfg->cfg_pool,
  641. (rspamd_mempool_destruct_t) rspamd_ptr_array_free_hard, ctx->mirrors);
  642. ctx->cfg = cfg;
  643. ctx->lua_state = cfg->lua_state;
  644. ctx->cmp_refs = g_array_new(FALSE, FALSE, sizeof(gint));
  645. rspamd_mempool_add_destructor(cfg->cfg_pool,
  646. (rspamd_mempool_destruct_t) rspamd_array_free_hard, ctx->cmp_refs);
  647. ctx->max_retries = DEFAULT_RETRIES;
  648. ctx->spam_header = RSPAMD_MILTER_SPAM_HEADER;
  649. rspamd_rcl_register_worker_option(cfg,
  650. type,
  651. "timeout",
  652. rspamd_rcl_parse_struct_time,
  653. ctx,
  654. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, timeout),
  655. RSPAMD_CL_FLAG_TIME_FLOAT,
  656. "IO timeout");
  657. rspamd_rcl_register_worker_option(cfg,
  658. type,
  659. "keypair",
  660. rspamd_rcl_parse_struct_keypair,
  661. ctx,
  662. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, key),
  663. 0,
  664. "Server's keypair");
  665. rspamd_rcl_register_worker_option(cfg,
  666. type,
  667. "encrypted_only",
  668. rspamd_rcl_parse_struct_boolean,
  669. ctx,
  670. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, encrypted_only),
  671. 0,
  672. "Allow only encrypted connections");
  673. rspamd_rcl_register_worker_option(cfg,
  674. type,
  675. "upstream",
  676. rspamd_proxy_parse_upstream,
  677. ctx,
  678. 0,
  679. 0,
  680. "List of upstreams");
  681. rspamd_rcl_register_worker_option(cfg,
  682. type,
  683. "mirror",
  684. rspamd_proxy_parse_mirror,
  685. ctx,
  686. 0,
  687. RSPAMD_CL_FLAG_MULTIPLE,
  688. "List of mirrors");
  689. rspamd_rcl_register_worker_option(cfg,
  690. type,
  691. "script",
  692. rspamd_proxy_parse_script,
  693. ctx,
  694. 0,
  695. RSPAMD_CL_FLAG_MULTIPLE,
  696. "Compare script to be executed");
  697. rspamd_rcl_register_worker_option(cfg,
  698. type,
  699. "max_retries",
  700. rspamd_rcl_parse_struct_integer,
  701. ctx,
  702. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, max_retries),
  703. RSPAMD_CL_FLAG_UINT,
  704. "Maximum number of retries for master connection");
  705. rspamd_rcl_register_worker_option(cfg,
  706. type,
  707. "milter",
  708. rspamd_rcl_parse_struct_boolean,
  709. ctx,
  710. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, milter),
  711. 0,
  712. "Accept milter connections, not HTTP");
  713. rspamd_rcl_register_worker_option(cfg,
  714. type,
  715. "discard_on_reject",
  716. rspamd_rcl_parse_struct_boolean,
  717. ctx,
  718. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, discard_on_reject),
  719. 0,
  720. "Tell MTA to discard rejected messages silently");
  721. rspamd_rcl_register_worker_option(cfg,
  722. type,
  723. "quarantine_on_reject",
  724. rspamd_rcl_parse_struct_boolean,
  725. ctx,
  726. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, quarantine_on_reject),
  727. 0,
  728. "Tell MTA to quarantine rejected messages");
  729. rspamd_rcl_register_worker_option(cfg,
  730. type,
  731. "spam_header",
  732. rspamd_rcl_parse_struct_string,
  733. ctx,
  734. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, spam_header),
  735. 0,
  736. "Use the specific spam header (default: X-Spam)");
  737. rspamd_rcl_register_worker_option(cfg,
  738. type,
  739. "client_ca_name",
  740. rspamd_rcl_parse_struct_string,
  741. ctx,
  742. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, client_ca_name),
  743. 0,
  744. "Allow certificates issued by this CA to be treated as client certificates");
  745. rspamd_rcl_register_worker_option(cfg,
  746. type,
  747. "reject_message",
  748. rspamd_rcl_parse_struct_string,
  749. ctx,
  750. G_STRUCT_OFFSET(struct rspamd_proxy_ctx, reject_message),
  751. 0,
  752. "Use custom rejection message");
  753. return ctx;
  754. }
  755. static void
  756. proxy_backend_close_connection(struct rspamd_proxy_backend_connection *conn)
  757. {
  758. if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  759. if (conn->backend_conn) {
  760. rspamd_http_connection_reset(conn->backend_conn);
  761. rspamd_http_connection_unref(conn->backend_conn);
  762. close(conn->backend_sock);
  763. }
  764. conn->flags |= RSPAMD_BACKEND_CLOSED;
  765. }
  766. }
  767. static gboolean
  768. proxy_backend_parse_results(struct rspamd_proxy_session *session,
  769. struct rspamd_proxy_backend_connection *conn,
  770. lua_State *L, gint parser_ref,
  771. struct rspamd_http_message *msg,
  772. goffset *body_offset,
  773. const rspamd_ftok_t *ct)
  774. {
  775. struct ucl_parser *parser;
  776. gint err_idx;
  777. const gchar *in = msg->body_buf.begin;
  778. gsize inlen = msg->body_buf.len;
  779. const rspamd_ftok_t *offset_hdr;
  780. if (inlen == 0 || in == NULL) {
  781. return FALSE;
  782. }
  783. offset_hdr = rspamd_http_message_find_header(msg, MESSAGE_OFFSET_HEADER);
  784. if (offset_hdr) {
  785. gulong val;
  786. if (rspamd_strtoul(offset_hdr->begin, offset_hdr->len, &val) && val < inlen) {
  787. if (body_offset) {
  788. *body_offset = val;
  789. }
  790. inlen = val;
  791. }
  792. }
  793. if (parser_ref != -1) {
  794. /* Call parser function */
  795. lua_pushcfunction(L, &rspamd_lua_traceback);
  796. err_idx = lua_gettop(L);
  797. lua_rawgeti(L, LUA_REGISTRYINDEX, parser_ref);
  798. /* XXX: copies all data */
  799. lua_pushlstring(L, in, inlen);
  800. if (lua_pcall(L, 1, 1, err_idx) != 0) {
  801. msg_err_session(
  802. "cannot run lua parser script: %s",
  803. lua_tostring(L, -1));
  804. lua_settop(L, 0);
  805. return FALSE;
  806. }
  807. conn->results = ucl_object_lua_import(L, -1);
  808. lua_settop(L, 0);
  809. }
  810. else {
  811. rspamd_ftok_t json_ct;
  812. RSPAMD_FTOK_ASSIGN(&json_ct, "application/json");
  813. if (ct && rspamd_ftok_casecmp(ct, &json_ct) == 0) {
  814. parser = ucl_parser_new(0);
  815. if (!ucl_parser_add_chunk(parser, in, inlen)) {
  816. gchar *encoded;
  817. encoded = rspamd_encode_base64(in, inlen, 0, NULL);
  818. msg_err_session("cannot parse input: %s", ucl_parser_get_error(
  819. parser));
  820. msg_err_session("input encoded: %s", encoded);
  821. ucl_parser_free(parser);
  822. g_free(encoded);
  823. return FALSE;
  824. }
  825. conn->results = ucl_parser_get_object(parser);
  826. ucl_parser_free(parser);
  827. }
  828. }
  829. return TRUE;
  830. }
  831. static void
  832. proxy_call_cmp_script(struct rspamd_proxy_session *session, gint cbref)
  833. {
  834. gint err_idx;
  835. guint i;
  836. struct rspamd_proxy_backend_connection *conn;
  837. lua_State *L;
  838. L = session->ctx->lua_state;
  839. lua_pushcfunction(L, &rspamd_lua_traceback);
  840. err_idx = lua_gettop(L);
  841. lua_rawgeti(L, LUA_REGISTRYINDEX, cbref);
  842. lua_createtable(L, 0, session->mirror_conns->len + 1);
  843. /* Now push master results */
  844. if (session->master_conn && session->master_conn->results) {
  845. lua_pushstring(L, "master");
  846. ucl_object_push_lua(L, session->master_conn->results, true);
  847. lua_settable(L, -3);
  848. }
  849. else {
  850. lua_pushstring(L, "master");
  851. lua_pushstring(L, "no results");
  852. lua_settable(L, -3);
  853. }
  854. for (i = 0; i < session->mirror_conns->len; i++) {
  855. conn = g_ptr_array_index(session->mirror_conns, i);
  856. if (conn->results) {
  857. lua_pushstring(L, conn->name);
  858. ucl_object_push_lua(L, conn->results, true);
  859. lua_settable(L, -3);
  860. }
  861. else {
  862. lua_pushstring(L, conn->name);
  863. lua_pushstring(L, conn->err ? conn->err : "unknown error");
  864. lua_settable(L, -3);
  865. }
  866. }
  867. gchar log_tag[RSPAMD_LOG_ID_LEN + 1];
  868. rspamd_strlcpy(log_tag, session->pool->tag.uid, sizeof(log_tag));
  869. lua_pushstring(L, log_tag);
  870. if (lua_pcall(L, 2, 0, err_idx) != 0) {
  871. msg_err_session(
  872. "cannot run lua compare script: %s",
  873. lua_tostring(L, -1));
  874. }
  875. lua_settop(L, err_idx - 1);
  876. }
  877. static void
  878. proxy_session_dtor(struct rspamd_proxy_session *session)
  879. {
  880. guint i;
  881. gint cbref;
  882. struct rspamd_proxy_backend_connection *conn;
  883. if (session->master_conn && session->master_conn->results) {
  884. for (i = 0; i < session->ctx->cmp_refs->len; i++) {
  885. cbref = g_array_index(session->ctx->cmp_refs, gint, i);
  886. proxy_call_cmp_script(session, cbref);
  887. }
  888. }
  889. if (session->master_conn) {
  890. proxy_backend_close_connection(session->master_conn);
  891. }
  892. if (session->client_milter_conn) {
  893. rspamd_milter_session_unref(session->client_milter_conn);
  894. }
  895. else if (session->client_conn) {
  896. rspamd_http_connection_reset(session->client_conn);
  897. rspamd_http_connection_unref(session->client_conn);
  898. }
  899. if (session->map && session->map_len) {
  900. munmap(session->map, session->map_len);
  901. }
  902. for (i = 0; i < session->mirror_conns->len; i++) {
  903. conn = g_ptr_array_index(session->mirror_conns, i);
  904. if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) {
  905. proxy_backend_close_connection(conn);
  906. }
  907. if (conn->results) {
  908. ucl_object_unref(conn->results);
  909. }
  910. }
  911. if (session->master_conn) {
  912. if (session->master_conn->results) {
  913. ucl_object_unref(session->master_conn->results);
  914. }
  915. if (session->master_conn->task) {
  916. rspamd_session_destroy(session->master_conn->task->s);
  917. }
  918. }
  919. g_ptr_array_free(session->mirror_conns, TRUE);
  920. rspamd_http_message_shmem_unref(session->shmem_ref);
  921. rspamd_http_message_unref(session->client_message);
  922. if (session->client_addr) {
  923. rspamd_inet_address_free(session->client_addr);
  924. }
  925. if (session->client_sock != -1) {
  926. close(session->client_sock);
  927. }
  928. if (session->ctx->sessions_cache) {
  929. rspamd_worker_session_cache_remove(session->ctx->sessions_cache,
  930. session);
  931. }
  932. if (session->pool) {
  933. rspamd_mempool_delete(session->pool);
  934. }
  935. session->worker->nconns--;
  936. g_free(session);
  937. }
  938. static void
  939. proxy_request_compress(struct rspamd_http_message *msg)
  940. {
  941. guint flags;
  942. ZSTD_CCtx *zctx;
  943. rspamd_fstring_t *body;
  944. const gchar *in;
  945. gsize inlen;
  946. flags = rspamd_http_message_get_flags(msg);
  947. if (!rspamd_http_message_find_header(msg, COMPRESSION_HEADER)) {
  948. if ((flags & RSPAMD_HTTP_FLAG_SHMEM) ||
  949. !(flags & RSPAMD_HTTP_FLAG_HAS_BODY)) {
  950. /* Cannot compress shared or empty message */
  951. return;
  952. }
  953. in = rspamd_http_message_get_body(msg, &inlen);
  954. if (in == NULL || inlen == 0) {
  955. return;
  956. }
  957. body = rspamd_fstring_sized_new(ZSTD_compressBound(inlen));
  958. zctx = ZSTD_createCCtx();
  959. body->len = ZSTD_compressCCtx(zctx, body->str, body->allocated,
  960. in, inlen, 1);
  961. if (ZSTD_isError(body->len)) {
  962. msg_err("compression error");
  963. rspamd_fstring_free(body);
  964. ZSTD_freeCCtx(zctx);
  965. return;
  966. }
  967. ZSTD_freeCCtx(zctx);
  968. rspamd_http_message_set_body_from_fstring_steal(msg, body);
  969. rspamd_http_message_add_header(msg, COMPRESSION_HEADER, "zstd");
  970. }
  971. }
  972. static void
  973. proxy_request_decompress(struct rspamd_http_message *msg)
  974. {
  975. rspamd_fstring_t *body;
  976. const gchar *in;
  977. gsize inlen, outlen, r;
  978. ZSTD_DStream *zstream;
  979. ZSTD_inBuffer zin;
  980. ZSTD_outBuffer zout;
  981. if (rspamd_http_message_find_header(msg, COMPRESSION_HEADER)) {
  982. in = rspamd_http_message_get_body(msg, &inlen);
  983. if (in == NULL || inlen == 0) {
  984. return;
  985. }
  986. zstream = ZSTD_createDStream();
  987. ZSTD_initDStream(zstream);
  988. zin.pos = 0;
  989. zin.src = in;
  990. zin.size = inlen;
  991. if ((outlen = ZSTD_getDecompressedSize(zin.src, zin.size)) == 0) {
  992. outlen = ZSTD_DStreamOutSize();
  993. }
  994. body = rspamd_fstring_sized_new(outlen);
  995. zout.dst = body->str;
  996. zout.pos = 0;
  997. zout.size = outlen;
  998. while (zin.pos < zin.size) {
  999. r = ZSTD_decompressStream(zstream, &zout, &zin);
  1000. if (ZSTD_isError(r)) {
  1001. msg_err("Decompression error: %s", ZSTD_getErrorName(r));
  1002. ZSTD_freeDStream(zstream);
  1003. rspamd_fstring_free(body);
  1004. return;
  1005. }
  1006. if (zout.pos == zout.size) {
  1007. /* We need to extend output buffer */
  1008. zout.size = zout.size * 2 + 1;
  1009. body = rspamd_fstring_grow(body, zout.size);
  1010. zout.size = body->allocated;
  1011. zout.dst = body->str;
  1012. }
  1013. }
  1014. body->len = zout.pos;
  1015. ZSTD_freeDStream(zstream);
  1016. rspamd_http_message_set_body_from_fstring_steal(msg, body);
  1017. rspamd_http_message_remove_header(msg, COMPRESSION_HEADER);
  1018. }
  1019. }
  1020. static struct rspamd_proxy_session *
  1021. proxy_session_refresh(struct rspamd_proxy_session *session)
  1022. {
  1023. struct rspamd_proxy_session *nsession;
  1024. nsession = g_malloc0(sizeof(*nsession));
  1025. nsession->client_milter_conn = session->client_milter_conn;
  1026. session->client_milter_conn = NULL;
  1027. rspamd_milter_update_userdata(nsession->client_milter_conn,
  1028. nsession);
  1029. nsession->client_addr = session->client_addr;
  1030. session->client_addr = NULL;
  1031. nsession->ctx = session->ctx;
  1032. nsession->worker = session->worker;
  1033. nsession->pool = rspamd_mempool_new(rspamd_mempool_suggest_size(), "proxy", 0);
  1034. nsession->client_sock = session->client_sock;
  1035. session->client_sock = -1;
  1036. nsession->mirror_conns = g_ptr_array_sized_new(nsession->ctx->mirrors->len);
  1037. REF_INIT_RETAIN(nsession, proxy_session_dtor);
  1038. if (nsession->ctx->sessions_cache) {
  1039. rspamd_worker_session_cache_add(nsession->ctx->sessions_cache,
  1040. nsession->pool->tag.uid, &nsession->ref.refcount, nsession);
  1041. }
  1042. return nsession;
  1043. }
  1044. static gboolean
  1045. proxy_check_file(struct rspamd_http_message *msg,
  1046. struct rspamd_proxy_session *session)
  1047. {
  1048. const rspamd_ftok_t *tok, *key_tok;
  1049. rspamd_ftok_t srch;
  1050. gchar *file_str;
  1051. GHashTable *query_args;
  1052. GHashTableIter it;
  1053. gpointer k, v;
  1054. struct http_parser_url u;
  1055. rspamd_fstring_t *new_url;
  1056. tok = rspamd_http_message_find_header(msg, "File");
  1057. if (tok) {
  1058. file_str = rspamd_mempool_ftokdup(session->pool, tok);
  1059. session->map = rspamd_file_xmap(file_str, PROT_READ, &session->map_len,
  1060. TRUE);
  1061. if (session->map == NULL) {
  1062. if (session->map_len != 0) {
  1063. msg_err_session("cannot map %s: %s", file_str,
  1064. strerror(errno));
  1065. return FALSE;
  1066. }
  1067. }
  1068. /* Remove header after processing */
  1069. rspamd_http_message_remove_header(msg, "File");
  1070. session->fname = file_str;
  1071. }
  1072. else {
  1073. /* Need to parse query URL */
  1074. if (http_parser_parse_url(RSPAMD_FSTRING_DATA(msg->url),
  1075. RSPAMD_FSTRING_LEN(msg->url), 0, &u) != 0) {
  1076. msg_err_session("bad request url: %V", msg->url);
  1077. return FALSE;
  1078. }
  1079. if (u.field_set & (1 << UF_QUERY)) {
  1080. /* In case if we have a query, we need to store it somewhere */
  1081. query_args = rspamd_http_message_parse_query(msg);
  1082. srch.begin = "File";
  1083. srch.len = strlen("File");
  1084. tok = g_hash_table_lookup(query_args, &srch);
  1085. if (tok) {
  1086. file_str = rspamd_mempool_ftokdup(session->pool, tok);
  1087. session->map = rspamd_file_xmap(file_str, PROT_READ,
  1088. &session->map_len, TRUE);
  1089. if (session->map == NULL) {
  1090. if (session->map_len != 0) {
  1091. msg_err_session("cannot map %s: %s", file_str,
  1092. strerror(errno));
  1093. g_hash_table_unref(query_args);
  1094. return FALSE;
  1095. }
  1096. }
  1097. /* We need to create a new URL with file attribute removed */
  1098. new_url = rspamd_fstring_new_init(RSPAMD_FSTRING_DATA(msg->url),
  1099. u.field_data[UF_QUERY].off);
  1100. new_url = rspamd_fstring_append(new_url, "?", 1);
  1101. g_hash_table_iter_init(&it, query_args);
  1102. while (g_hash_table_iter_next(&it, &k, &v)) {
  1103. key_tok = k;
  1104. tok = v;
  1105. if (!rspamd_ftok_icase_equal(key_tok, &srch)) {
  1106. rspamd_printf_fstring(&new_url, "%T=%T&",
  1107. key_tok, tok);
  1108. }
  1109. }
  1110. /* Erase last character (might be either & or ?) */
  1111. rspamd_fstring_erase(new_url, new_url->len - 1, 1);
  1112. rspamd_fstring_free(msg->url);
  1113. msg->url = new_url;
  1114. session->fname = file_str;
  1115. }
  1116. g_hash_table_unref(query_args);
  1117. }
  1118. }
  1119. return TRUE;
  1120. }
  1121. static void
  1122. proxy_backend_mirror_error_handler(struct rspamd_http_connection *conn, GError *err)
  1123. {
  1124. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1125. struct rspamd_proxy_session *session;
  1126. session = bk_conn->s;
  1127. msg_info_session("abnormally closing connection from backend: %s:%s, "
  1128. "error: %e",
  1129. bk_conn->name,
  1130. rspamd_inet_address_to_string_pretty(
  1131. rspamd_upstream_addr_cur(bk_conn->up)),
  1132. err);
  1133. if (err) {
  1134. bk_conn->err = rspamd_mempool_strdup(session->pool, err->message);
  1135. }
  1136. rspamd_upstream_fail(bk_conn->up, FALSE, err ? err->message : "unknown");
  1137. proxy_backend_close_connection(bk_conn);
  1138. REF_RELEASE(bk_conn->s);
  1139. }
  1140. static gint
  1141. proxy_backend_mirror_finish_handler(struct rspamd_http_connection *conn,
  1142. struct rspamd_http_message *msg)
  1143. {
  1144. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1145. struct rspamd_proxy_session *session;
  1146. const rspamd_ftok_t *orig_ct;
  1147. session = bk_conn->s;
  1148. proxy_request_decompress(msg);
  1149. orig_ct = rspamd_http_message_find_header(msg, "Content-Type");
  1150. if (!proxy_backend_parse_results(session, bk_conn, session->ctx->lua_state,
  1151. bk_conn->parser_from_ref, msg, NULL, orig_ct)) {
  1152. msg_warn_session("cannot parse results from the mirror backend %s:%s",
  1153. bk_conn->name,
  1154. rspamd_inet_address_to_string(
  1155. rspamd_upstream_addr_cur(bk_conn->up)));
  1156. bk_conn->err = "cannot parse ucl";
  1157. }
  1158. msg_info_session("finished mirror connection to %s", bk_conn->name);
  1159. rspamd_upstream_ok(bk_conn->up);
  1160. proxy_backend_close_connection(bk_conn);
  1161. REF_RELEASE(bk_conn->s);
  1162. return 0;
  1163. }
  1164. static void
  1165. proxy_open_mirror_connections(struct rspamd_proxy_session *session)
  1166. {
  1167. gdouble coin;
  1168. struct rspamd_http_mirror *m;
  1169. guint i;
  1170. struct rspamd_proxy_backend_connection *bk_conn;
  1171. struct rspamd_http_message *msg;
  1172. GError *err = NULL;
  1173. coin = rspamd_random_double();
  1174. for (i = 0; i < session->ctx->mirrors->len; i++) {
  1175. m = g_ptr_array_index(session->ctx->mirrors, i);
  1176. if (m->prob < coin) {
  1177. /* No luck */
  1178. continue;
  1179. }
  1180. bk_conn = rspamd_mempool_alloc0(session->pool,
  1181. sizeof(*bk_conn));
  1182. bk_conn->s = session;
  1183. bk_conn->name = m->name;
  1184. bk_conn->timeout = m->timeout;
  1185. bk_conn->up = rspamd_upstream_get(m->u,
  1186. RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0);
  1187. bk_conn->parser_from_ref = m->parser_from_ref;
  1188. bk_conn->parser_to_ref = m->parser_to_ref;
  1189. if (bk_conn->up == NULL) {
  1190. msg_err_session("cannot select upstream for %s", m->name);
  1191. continue;
  1192. }
  1193. bk_conn->backend_sock = rspamd_inet_address_connect(
  1194. rspamd_upstream_addr_next(bk_conn->up),
  1195. SOCK_STREAM, TRUE);
  1196. if (bk_conn->backend_sock == -1) {
  1197. msg_err_session("cannot connect upstream for %s", m->name);
  1198. rspamd_upstream_fail(bk_conn->up, TRUE, strerror(errno));
  1199. continue;
  1200. }
  1201. msg = rspamd_http_connection_copy_msg(session->client_message, &err);
  1202. if (msg == NULL) {
  1203. msg_err_session("cannot copy message to send to a mirror %s: %e",
  1204. m->name, err);
  1205. if (err) {
  1206. g_error_free(err);
  1207. }
  1208. continue;
  1209. }
  1210. const char *up_name = rspamd_upstream_name(bk_conn->up);
  1211. if (up_name) {
  1212. rspamd_http_message_remove_header(msg, "Host");
  1213. rspamd_http_message_add_header(msg, "Host", up_name);
  1214. }
  1215. rspamd_http_message_add_header(msg, "Connection", "close");
  1216. if (msg->url->len == 0) {
  1217. msg->url = rspamd_fstring_append(msg->url, "/check", strlen("/check"));
  1218. }
  1219. if (m->settings_id != NULL) {
  1220. rspamd_http_message_remove_header(msg, "Settings-ID");
  1221. rspamd_http_message_add_header(msg, "Settings-ID", m->settings_id);
  1222. }
  1223. bk_conn->backend_conn = rspamd_http_connection_new_client_socket(
  1224. session->ctx->http_ctx,
  1225. NULL,
  1226. proxy_backend_mirror_error_handler,
  1227. proxy_backend_mirror_finish_handler,
  1228. RSPAMD_HTTP_CLIENT_SIMPLE,
  1229. bk_conn->backend_sock);
  1230. if (m->key) {
  1231. msg->peer_key = rspamd_pubkey_ref(m->key);
  1232. }
  1233. if (m->local ||
  1234. rspamd_inet_address_is_local(rspamd_upstream_addr_cur(bk_conn->up))) {
  1235. if (session->fname) {
  1236. rspamd_http_message_add_header(msg, "File", session->fname);
  1237. }
  1238. msg->method = HTTP_GET;
  1239. rspamd_http_connection_write_message_shared(bk_conn->backend_conn,
  1240. msg, rspamd_upstream_name(bk_conn->up), NULL, bk_conn,
  1241. bk_conn->timeout);
  1242. }
  1243. else {
  1244. if (session->fname) {
  1245. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1246. rspamd_http_message_set_body(msg, session->map, session->map_len);
  1247. }
  1248. msg->method = HTTP_POST;
  1249. if (m->compress) {
  1250. proxy_request_compress(msg);
  1251. if (session->client_milter_conn) {
  1252. rspamd_http_message_add_header(msg, "Content-Type",
  1253. "application/octet-stream");
  1254. }
  1255. }
  1256. else {
  1257. if (session->client_milter_conn) {
  1258. rspamd_http_message_add_header(msg, "Content-Type",
  1259. "text/plain");
  1260. }
  1261. }
  1262. rspamd_http_connection_write_message(bk_conn->backend_conn,
  1263. msg, rspamd_upstream_name(bk_conn->up), NULL, bk_conn,
  1264. bk_conn->timeout);
  1265. }
  1266. g_ptr_array_add(session->mirror_conns, bk_conn);
  1267. REF_RETAIN(session);
  1268. msg_info_session("send request to %s", m->name);
  1269. }
  1270. }
  1271. static void
  1272. proxy_client_write_error(struct rspamd_proxy_session *session, gint code,
  1273. const gchar *status)
  1274. {
  1275. struct rspamd_http_message *reply;
  1276. if (session->client_milter_conn) {
  1277. rspamd_milter_send_action(session->client_milter_conn,
  1278. RSPAMD_MILTER_TEMPFAIL);
  1279. REF_RELEASE(session);
  1280. }
  1281. else {
  1282. reply = rspamd_http_new_message(HTTP_RESPONSE);
  1283. switch (code) {
  1284. case ETIMEDOUT:
  1285. reply->code = 504;
  1286. reply->status = RSPAMD_FSTRING_LIT("Gateway timeout");
  1287. break;
  1288. case ECONNRESET:
  1289. case ECONNABORTED:
  1290. reply->code = 502;
  1291. reply->status = RSPAMD_FSTRING_LIT("Gateway connection reset");
  1292. break;
  1293. case ECONNREFUSED:
  1294. reply->code = 502;
  1295. reply->status = RSPAMD_FSTRING_LIT("Gateway connection refused");
  1296. break;
  1297. default:
  1298. if (code >= 300) {
  1299. /* Likely HTTP error */
  1300. reply->code = code;
  1301. reply->status = rspamd_fstring_new_init(status, strlen(status));
  1302. }
  1303. else {
  1304. reply->code = 502;
  1305. reply->status = RSPAMD_FSTRING_LIT("Unknown gateway error: ");
  1306. reply->status = rspamd_fstring_append(reply->status,
  1307. status, strlen(status));
  1308. }
  1309. break;
  1310. }
  1311. rspamd_http_connection_write_message(session->client_conn,
  1312. reply, NULL, NULL, session,
  1313. session->ctx->timeout);
  1314. }
  1315. }
  1316. static void
  1317. proxy_backend_master_error_handler(struct rspamd_http_connection *conn, GError *err)
  1318. {
  1319. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1320. struct rspamd_proxy_session *session;
  1321. session = bk_conn->s;
  1322. session->retries++;
  1323. msg_info_session("abnormally closing connection from backend: %s, error: %e,"
  1324. " retries left: %d",
  1325. rspamd_inet_address_to_string_pretty(
  1326. rspamd_upstream_addr_cur(session->master_conn->up)),
  1327. err,
  1328. session->ctx->max_retries - session->retries);
  1329. rspamd_upstream_fail(bk_conn->up, FALSE, err ? err->message : "unknown");
  1330. proxy_backend_close_connection(session->master_conn);
  1331. if (session->ctx->max_retries > 0 &&
  1332. session->retries >= session->ctx->max_retries) {
  1333. msg_err_session("cannot connect to upstream, maximum retries "
  1334. "has been reached: %d",
  1335. session->retries);
  1336. /* Terminate session immediately */
  1337. if (err) {
  1338. proxy_client_write_error(session, err->code, err->message);
  1339. }
  1340. else {
  1341. proxy_client_write_error(session, 503, "Unknown error after no retries left");
  1342. }
  1343. }
  1344. else {
  1345. if (!proxy_send_master_message(session)) {
  1346. if (err) {
  1347. proxy_client_write_error(session, err->code, err->message);
  1348. }
  1349. else {
  1350. proxy_client_write_error(session, 503, "Unknown error on write");
  1351. }
  1352. }
  1353. else {
  1354. msg_info_session("retry connection to: %s"
  1355. " retries left: %d",
  1356. rspamd_inet_address_to_string(
  1357. rspamd_upstream_addr_cur(session->master_conn->up)),
  1358. session->ctx->max_retries - session->retries);
  1359. }
  1360. }
  1361. }
  1362. static gint
  1363. proxy_backend_master_finish_handler(struct rspamd_http_connection *conn,
  1364. struct rspamd_http_message *msg)
  1365. {
  1366. struct rspamd_proxy_backend_connection *bk_conn = conn->ud;
  1367. struct rspamd_proxy_session *session, *nsession;
  1368. rspamd_fstring_t *reply;
  1369. const rspamd_ftok_t *orig_ct;
  1370. goffset body_offset = -1;
  1371. session = bk_conn->s;
  1372. rspamd_http_connection_steal_msg(session->master_conn->backend_conn);
  1373. proxy_request_decompress(msg);
  1374. /*
  1375. * These are likely set by an http library, so we will double these headers
  1376. * if they are not removed
  1377. */
  1378. rspamd_http_message_remove_header(msg, "Content-Length");
  1379. rspamd_http_message_remove_header(msg, "Connection");
  1380. rspamd_http_message_remove_header(msg, "Date");
  1381. rspamd_http_message_remove_header(msg, "Server");
  1382. rspamd_http_message_remove_header(msg, "Key");
  1383. orig_ct = rspamd_http_message_find_header(msg, "Content-Type");
  1384. rspamd_http_connection_reset(session->master_conn->backend_conn);
  1385. if (!proxy_backend_parse_results(session, bk_conn, session->ctx->lua_state,
  1386. bk_conn->parser_from_ref, msg, &body_offset, orig_ct)) {
  1387. msg_warn_session("cannot parse results from the master backend");
  1388. }
  1389. if (session->legacy_support > LEGACY_SUPPORT_NO) {
  1390. /* We need to reformat ucl to fit with legacy spamc protocol */
  1391. if (bk_conn->results) {
  1392. reply = rspamd_fstring_new();
  1393. if (session->legacy_support == LEGACY_SUPPORT_SPAMC) {
  1394. rspamd_ucl_tospamc_output(bk_conn->results, &reply);
  1395. msg->flags |= RSPAMD_HTTP_FLAG_SPAMC;
  1396. }
  1397. else {
  1398. rspamd_ucl_torspamc_output(bk_conn->results, &reply);
  1399. }
  1400. rspamd_http_message_set_body_from_fstring_steal(msg, reply);
  1401. msg->method = HTTP_SYMBOLS;
  1402. }
  1403. else {
  1404. msg_warn_session("cannot parse results from the master backend, "
  1405. "return them as is");
  1406. }
  1407. }
  1408. rspamd_upstream_ok(bk_conn->up);
  1409. if (session->client_milter_conn) {
  1410. nsession = proxy_session_refresh(session);
  1411. if (body_offset > 0) {
  1412. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1413. session->master_conn->results,
  1414. msg->body_buf.begin + body_offset,
  1415. msg->body_buf.len - body_offset);
  1416. }
  1417. else {
  1418. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1419. session->master_conn->results, NULL, 0);
  1420. }
  1421. REF_RELEASE(session);
  1422. rspamd_http_message_free(msg);
  1423. }
  1424. else {
  1425. const gchar *passed_ct = NULL;
  1426. if (orig_ct) {
  1427. passed_ct = rspamd_mempool_ftokdup(session->pool, orig_ct);
  1428. /* Remove original */
  1429. rspamd_http_message_remove_header(msg, "Content-Type");
  1430. }
  1431. rspamd_http_connection_write_message(session->client_conn,
  1432. msg, NULL, passed_ct, session,
  1433. bk_conn->timeout);
  1434. }
  1435. return 0;
  1436. }
  1437. static void
  1438. rspamd_proxy_scan_self_reply(struct rspamd_task *task)
  1439. {
  1440. struct rspamd_http_message *msg;
  1441. struct rspamd_proxy_session *session = task->fin_arg, *nsession;
  1442. ucl_object_t *rep = NULL;
  1443. int out_type = UCL_EMIT_JSON_COMPACT;
  1444. const char *ctype = "application/json";
  1445. const rspamd_ftok_t *accept_hdr = rspamd_task_get_request_header(task, "Accept");
  1446. if (accept_hdr && rspamd_substring_search(accept_hdr->begin, accept_hdr->len,
  1447. "application/msgpack", sizeof("application/msgpack") - 1) != -1) {
  1448. ctype = "application/msgpack";
  1449. out_type = UCL_EMIT_MSGPACK;
  1450. }
  1451. msg = rspamd_http_new_message(HTTP_RESPONSE);
  1452. msg->date = time(NULL);
  1453. msg->code = 200;
  1454. switch (task->cmd) {
  1455. case CMD_CHECK:
  1456. case CMD_SKIP:
  1457. case CMD_CHECK_RSPAMC:
  1458. case CMD_CHECK_SPAMC:
  1459. case CMD_CHECK_V2:
  1460. rspamd_task_set_finish_time(task);
  1461. rspamd_protocol_http_reply(msg, task, &rep, out_type);
  1462. rspamd_protocol_write_log_pipe(task);
  1463. break;
  1464. case CMD_PING:
  1465. rspamd_http_message_set_body(msg, "pong" CRLF, 6);
  1466. ctype = "text/plain";
  1467. break;
  1468. default:
  1469. msg_err_task("BROKEN");
  1470. break;
  1471. }
  1472. session->master_conn->flags |= RSPAMD_BACKEND_CLOSED;
  1473. if (rep) {
  1474. session->master_conn->results = ucl_object_ref(rep);
  1475. }
  1476. if (session->client_milter_conn) {
  1477. nsession = proxy_session_refresh(session);
  1478. if (task->flags & RSPAMD_TASK_FLAG_MESSAGE_REWRITE) {
  1479. const gchar *start;
  1480. goffset len, hdr_off;
  1481. start = task->msg.begin;
  1482. len = task->msg.len;
  1483. hdr_off = MESSAGE_FIELD(task, raw_headers_content).len;
  1484. if (hdr_off < len) {
  1485. start += hdr_off;
  1486. len -= hdr_off;
  1487. /* The problem here is that we need not end of headers, we need
  1488. * start of body.
  1489. *
  1490. * Hence, we need to skip one \r\n till there is anything else in
  1491. * a line.
  1492. */
  1493. if (*start == '\r' && len > 0) {
  1494. start++;
  1495. len--;
  1496. }
  1497. if (*start == '\n' && len > 0) {
  1498. start++;
  1499. len--;
  1500. }
  1501. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1502. session->master_conn->results, start, len);
  1503. }
  1504. else {
  1505. /* XXX: should never happen! */
  1506. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1507. session->master_conn->results, NULL, 0);
  1508. }
  1509. }
  1510. else {
  1511. rspamd_milter_send_task_results(nsession->client_milter_conn,
  1512. session->master_conn->results, NULL, 0);
  1513. }
  1514. rspamd_http_message_free(msg);
  1515. REF_RELEASE(session);
  1516. }
  1517. else {
  1518. rspamd_http_connection_reset(session->client_conn);
  1519. rspamd_http_connection_write_message(session->client_conn,
  1520. msg,
  1521. NULL,
  1522. ctype,
  1523. session,
  1524. session->ctx->timeout / 10.0);
  1525. }
  1526. }
  1527. static gboolean
  1528. rspamd_proxy_task_fin(void *ud)
  1529. {
  1530. struct rspamd_task *task = ud;
  1531. msg_debug_task("finish task");
  1532. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  1533. rspamd_proxy_scan_self_reply(task);
  1534. return TRUE;
  1535. }
  1536. if (!rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL)) {
  1537. rspamd_proxy_scan_self_reply(task);
  1538. return TRUE;
  1539. }
  1540. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  1541. rspamd_proxy_scan_self_reply(task);
  1542. return TRUE;
  1543. }
  1544. /* One more iteration */
  1545. return FALSE;
  1546. }
  1547. static gboolean
  1548. rspamd_proxy_self_scan(struct rspamd_proxy_session *session)
  1549. {
  1550. struct rspamd_task *task;
  1551. struct rspamd_http_message *msg;
  1552. const gchar *data;
  1553. gsize len;
  1554. msg = session->client_message;
  1555. task = rspamd_task_new(session->worker, session->ctx->cfg,
  1556. session->pool, session->ctx->lang_det,
  1557. session->ctx->event_loop, FALSE);
  1558. task->flags |= RSPAMD_TASK_FLAG_MIME;
  1559. if (session->ctx->milter) {
  1560. task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_MILTER |
  1561. RSPAMD_TASK_PROTOCOL_FLAG_BODY_BLOCK;
  1562. }
  1563. task->sock = -1;
  1564. if (session->client_milter_conn) {
  1565. task->client_addr = rspamd_inet_address_copy(
  1566. session->client_milter_conn->addr, NULL);
  1567. }
  1568. else {
  1569. task->client_addr = rspamd_inet_address_copy(session->client_addr, NULL);
  1570. }
  1571. task->fin_arg = session;
  1572. task->resolver = session->ctx->resolver;
  1573. /* TODO: allow to disable autolearn in protocol */
  1574. task->flags |= RSPAMD_TASK_FLAG_LEARN_AUTO;
  1575. task->s = rspamd_session_create(task->task_pool, rspamd_proxy_task_fin,
  1576. NULL, (event_finalizer_t) rspamd_task_free, task);
  1577. data = rspamd_http_message_get_body(msg, &len);
  1578. if (session->backend->settings_id) {
  1579. rspamd_http_message_remove_header(msg, "Settings-ID");
  1580. rspamd_http_message_add_header(msg, "Settings-ID",
  1581. session->backend->settings_id);
  1582. }
  1583. /* Process message */
  1584. if (!rspamd_protocol_handle_request(task, msg)) {
  1585. msg_err_task("cannot handle request: %e", task->err);
  1586. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1587. }
  1588. else {
  1589. if (task->cmd == CMD_PING) {
  1590. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1591. }
  1592. else {
  1593. if (!rspamd_task_load_message(task, msg, data, len)) {
  1594. msg_err_task("cannot load message: %e", task->err);
  1595. task->flags |= RSPAMD_TASK_FLAG_SKIP;
  1596. }
  1597. }
  1598. }
  1599. /* Set global timeout for the task */
  1600. if (session->ctx->default_upstream->timeout > 0.0) {
  1601. task->timeout_ev.data = task;
  1602. ev_timer_init(&task->timeout_ev, rspamd_task_timeout,
  1603. session->ctx->default_upstream->timeout,
  1604. session->ctx->default_upstream->timeout);
  1605. ev_timer_start(task->event_loop, &task->timeout_ev);
  1606. }
  1607. else if (session->ctx->has_self_scan) {
  1608. if (!isnan(session->ctx->task_timeout) && session->ctx->task_timeout > 0) {
  1609. task->timeout_ev.data = task;
  1610. ev_timer_init(&task->timeout_ev, rspamd_task_timeout,
  1611. session->ctx->cfg->task_timeout,
  1612. session->ctx->default_upstream->timeout);
  1613. ev_timer_start(task->event_loop, &task->timeout_ev);
  1614. }
  1615. }
  1616. session->master_conn->task = task;
  1617. rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL);
  1618. rspamd_session_pending(task->s);
  1619. return TRUE;
  1620. }
  1621. static gboolean
  1622. proxy_send_master_message(struct rspamd_proxy_session *session)
  1623. {
  1624. struct rspamd_http_message *msg;
  1625. struct rspamd_http_upstream *backend = NULL;
  1626. const rspamd_ftok_t *host;
  1627. GError *err = NULL;
  1628. gchar hostbuf[512];
  1629. host = rspamd_http_message_find_header(session->client_message, "Host");
  1630. if (host == NULL) {
  1631. backend = session->ctx->default_upstream;
  1632. }
  1633. else {
  1634. rspamd_strlcpy(hostbuf, host->begin, MIN(host->len + 1, sizeof(hostbuf)));
  1635. backend = g_hash_table_lookup(session->ctx->upstreams, hostbuf);
  1636. if (backend == NULL) {
  1637. backend = session->ctx->default_upstream;
  1638. }
  1639. /* Remove the original Host header */
  1640. rspamd_http_message_remove_header(session->client_message, "Host");
  1641. }
  1642. /* Remove the original `Connection` header */
  1643. rspamd_http_message_remove_header(session->client_message, "Connection");
  1644. if (backend == NULL) {
  1645. /* No backend */
  1646. msg_err_session("cannot find upstream for %s", host ? hostbuf : "default");
  1647. goto err;
  1648. }
  1649. else {
  1650. session->backend = backend;
  1651. if (backend->self_scan) {
  1652. return rspamd_proxy_self_scan(session);
  1653. }
  1654. retry:
  1655. if (session->ctx->max_retries &&
  1656. session->retries > session->ctx->max_retries) {
  1657. msg_err_session("cannot connect to upstream, maximum retries "
  1658. "has been reached: %d",
  1659. session->retries);
  1660. goto err;
  1661. }
  1662. /* Provide hash key if hashing based on source address is desired */
  1663. guint hash_len;
  1664. gpointer hash_key = rspamd_inet_address_get_hash_key(session->client_addr,
  1665. &hash_len);
  1666. if (session->ctx->max_retries > 1 &&
  1667. session->retries == session->ctx->max_retries) {
  1668. session->master_conn->up = rspamd_upstream_get_except(backend->u,
  1669. session->master_conn->up,
  1670. RSPAMD_UPSTREAM_ROUND_ROBIN,
  1671. hash_key, hash_len);
  1672. }
  1673. else {
  1674. session->master_conn->up = rspamd_upstream_get(backend->u,
  1675. RSPAMD_UPSTREAM_ROUND_ROBIN,
  1676. hash_key, hash_len);
  1677. }
  1678. session->master_conn->timeout = backend->timeout;
  1679. if (session->master_conn->up == NULL) {
  1680. msg_err_session("cannot select upstream for %s",
  1681. host ? hostbuf : "default");
  1682. goto err;
  1683. }
  1684. session->master_conn->backend_sock = rspamd_inet_address_connect(
  1685. rspamd_upstream_addr_next(session->master_conn->up),
  1686. SOCK_STREAM, TRUE);
  1687. if (session->master_conn->backend_sock == -1) {
  1688. msg_err_session("cannot connect upstream: %s(%s)",
  1689. host ? hostbuf : "default",
  1690. rspamd_inet_address_to_string_pretty(
  1691. rspamd_upstream_addr_cur(
  1692. session->master_conn->up)));
  1693. rspamd_upstream_fail(session->master_conn->up, TRUE,
  1694. strerror(errno));
  1695. session->retries++;
  1696. goto retry;
  1697. }
  1698. msg = rspamd_http_connection_copy_msg(session->client_message, &err);
  1699. if (msg == NULL) {
  1700. msg_err_session("cannot copy message to send it to the upstream: %e",
  1701. err);
  1702. if (err) {
  1703. g_error_free(err);
  1704. }
  1705. goto err; /* No fallback here */
  1706. }
  1707. /* Add new Host header */
  1708. const char *up_name = rspamd_upstream_name(session->master_conn->up);
  1709. if (up_name) {
  1710. rspamd_http_message_add_header(msg, "Host", up_name);
  1711. }
  1712. rspamd_http_message_add_header(msg, "Connection", "close");
  1713. session->master_conn->backend_conn = rspamd_http_connection_new_client_socket(
  1714. session->ctx->http_ctx,
  1715. NULL,
  1716. proxy_backend_master_error_handler,
  1717. proxy_backend_master_finish_handler,
  1718. RSPAMD_HTTP_CLIENT_SIMPLE,
  1719. session->master_conn->backend_sock);
  1720. session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED;
  1721. session->master_conn->parser_from_ref = backend->parser_from_ref;
  1722. session->master_conn->parser_to_ref = backend->parser_to_ref;
  1723. if (backend->key) {
  1724. msg->peer_key = rspamd_pubkey_ref(backend->key);
  1725. }
  1726. if (backend->settings_id != NULL) {
  1727. rspamd_http_message_remove_header(msg, "Settings-ID");
  1728. rspamd_http_message_add_header(msg, "Settings-ID",
  1729. backend->settings_id);
  1730. }
  1731. if (backend->local ||
  1732. rspamd_inet_address_is_local(
  1733. rspamd_upstream_addr_cur(
  1734. session->master_conn->up))) {
  1735. if (session->fname) {
  1736. rspamd_http_message_add_header(msg, "File", session->fname);
  1737. }
  1738. msg->method = HTTP_GET;
  1739. rspamd_http_connection_write_message_shared(
  1740. session->master_conn->backend_conn,
  1741. msg, rspamd_upstream_name(session->master_conn->up),
  1742. NULL, session->master_conn,
  1743. session->master_conn->timeout);
  1744. }
  1745. else {
  1746. if (session->fname) {
  1747. msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM;
  1748. rspamd_http_message_set_body(msg,
  1749. session->map, session->map_len);
  1750. }
  1751. msg->method = HTTP_POST;
  1752. if (backend->compress) {
  1753. proxy_request_compress(msg);
  1754. if (session->client_milter_conn) {
  1755. rspamd_http_message_add_header(msg, "Content-Type",
  1756. "application/octet-stream");
  1757. }
  1758. }
  1759. else {
  1760. if (session->client_milter_conn) {
  1761. rspamd_http_message_add_header(msg, "Content-Type",
  1762. "text/plain");
  1763. }
  1764. }
  1765. rspamd_http_connection_write_message(
  1766. session->master_conn->backend_conn,
  1767. msg, rspamd_upstream_name(session->master_conn->up),
  1768. NULL, session->master_conn,
  1769. session->master_conn->timeout);
  1770. }
  1771. }
  1772. return TRUE;
  1773. err:
  1774. if (session->client_milter_conn) {
  1775. rspamd_milter_send_action(session->client_milter_conn,
  1776. RSPAMD_MILTER_TEMPFAIL);
  1777. REF_RELEASE(session);
  1778. }
  1779. else {
  1780. rspamd_http_connection_steal_msg(session->client_conn);
  1781. rspamd_http_connection_reset(session->client_conn);
  1782. proxy_client_write_error(session, 404, "Backend not found");
  1783. }
  1784. return FALSE;
  1785. }
  1786. static void
  1787. proxy_client_error_handler(struct rspamd_http_connection *conn, GError *err)
  1788. {
  1789. struct rspamd_proxy_session *session = conn->ud;
  1790. msg_info_session("abnormally closing connection from: %s, error: %s",
  1791. rspamd_inet_address_to_string(session->client_addr), err->message);
  1792. /* Terminate session immediately */
  1793. proxy_backend_close_connection(session->master_conn);
  1794. REF_RELEASE(session);
  1795. }
  1796. static gint
  1797. proxy_client_finish_handler(struct rspamd_http_connection *conn,
  1798. struct rspamd_http_message *msg)
  1799. {
  1800. struct rspamd_proxy_session *session = conn->ud;
  1801. if (!session->master_conn) {
  1802. session->master_conn = rspamd_mempool_alloc0(session->pool,
  1803. sizeof(*session->master_conn));
  1804. session->master_conn->s = session;
  1805. session->master_conn->name = "master";
  1806. /* Reset spamc legacy */
  1807. if (msg->method >= HTTP_SYMBOLS) {
  1808. msg->method = HTTP_POST;
  1809. if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) {
  1810. session->legacy_support = LEGACY_SUPPORT_SPAMC;
  1811. msg_info_session("enabling legacy spamc mode for session");
  1812. }
  1813. else {
  1814. session->legacy_support = LEGACY_SUPPORT_RSPAMC;
  1815. msg_info_session("enabling legacy rspamc mode for session");
  1816. }
  1817. }
  1818. if (msg->url->len == 0) {
  1819. msg->url = rspamd_fstring_append(msg->url,
  1820. "/" MSG_CMD_CHECK_V2, strlen("/" MSG_CMD_CHECK_V2));
  1821. }
  1822. if (!proxy_check_file(msg, session)) {
  1823. goto err;
  1824. }
  1825. session->client_message = rspamd_http_connection_steal_msg(
  1826. session->client_conn);
  1827. session->shmem_ref = rspamd_http_message_shmem_ref(session->client_message);
  1828. rspamd_http_message_remove_header(msg, "Content-Length");
  1829. rspamd_http_message_remove_header(msg, "Transfer-Encoding");
  1830. rspamd_http_message_remove_header(msg, "Keep-Alive");
  1831. rspamd_http_message_remove_header(msg, "Connection");
  1832. rspamd_http_message_remove_header(msg, "Key");
  1833. proxy_open_mirror_connections(session);
  1834. rspamd_http_connection_reset(session->client_conn);
  1835. proxy_send_master_message(session);
  1836. }
  1837. else {
  1838. msg_info_session("finished master connection");
  1839. proxy_backend_close_connection(session->master_conn);
  1840. REF_RELEASE(session);
  1841. }
  1842. return 0;
  1843. err:
  1844. rspamd_http_connection_steal_msg(session->client_conn);
  1845. rspamd_http_message_remove_header(msg, "Content-Length");
  1846. rspamd_http_message_remove_header(msg, "Key");
  1847. rspamd_http_message_remove_header(msg, "Transfer-Encoding");
  1848. rspamd_http_message_remove_header(msg, "Keep-Alive");
  1849. rspamd_http_message_remove_header(msg, "Connection");
  1850. rspamd_http_connection_reset(session->client_conn);
  1851. proxy_client_write_error(session, 404, "Backend not found");
  1852. return 0;
  1853. }
  1854. static void
  1855. proxy_milter_finish_handler(gint fd,
  1856. struct rspamd_milter_session *rms,
  1857. void *ud)
  1858. {
  1859. struct rspamd_proxy_session *session = ud;
  1860. struct rspamd_http_message *msg;
  1861. session->client_milter_conn = rms;
  1862. if (rms->message == NULL || rms->message->len == 0) {
  1863. msg_info_session("finished milter connection");
  1864. proxy_backend_close_connection(session->master_conn);
  1865. REF_RELEASE(session);
  1866. }
  1867. else {
  1868. if (!session->master_conn) {
  1869. session->master_conn = rspamd_mempool_alloc0(session->pool,
  1870. sizeof(*session->master_conn));
  1871. }
  1872. msg = rspamd_milter_to_http(rms);
  1873. session->master_conn->s = session;
  1874. session->master_conn->name = "master";
  1875. session->client_message = msg;
  1876. proxy_open_mirror_connections(session);
  1877. proxy_send_master_message(session);
  1878. }
  1879. }
  1880. static void
  1881. proxy_milter_error_handler(gint fd,
  1882. struct rspamd_milter_session *rms, /* unused */
  1883. void *ud, GError *err)
  1884. {
  1885. struct rspamd_proxy_session *session = ud;
  1886. if (err && err->code != 0) {
  1887. msg_info_session("abnormally closing milter connection from: %s, "
  1888. "error: %e",
  1889. rspamd_inet_address_to_string_pretty(session->client_addr),
  1890. err);
  1891. /* Terminate session immediately */
  1892. proxy_backend_close_connection(session->master_conn);
  1893. REF_RELEASE(session);
  1894. }
  1895. else {
  1896. msg_info_session("normally closing milter connection from: %s, "
  1897. "%e",
  1898. rspamd_inet_address_to_string_pretty(session->client_addr),
  1899. err);
  1900. /* Terminate session immediately */
  1901. proxy_backend_close_connection(session->master_conn);
  1902. REF_RELEASE(session);
  1903. }
  1904. }
  1905. static void
  1906. proxy_accept_socket(EV_P_ ev_io *w, int revents)
  1907. {
  1908. struct rspamd_worker *worker = (struct rspamd_worker *) w->data;
  1909. struct rspamd_proxy_ctx *ctx;
  1910. rspamd_inet_addr_t *addr = NULL;
  1911. struct rspamd_proxy_session *session;
  1912. gint nfd;
  1913. ctx = worker->ctx;
  1914. if ((nfd =
  1915. rspamd_accept_from_socket(w->fd, &addr,
  1916. rspamd_worker_throttle_accept_events, worker->accept_events)) == -1) {
  1917. msg_warn("accept failed: %s", strerror(errno));
  1918. return;
  1919. }
  1920. /* Check for EAGAIN */
  1921. if (nfd == 0) {
  1922. rspamd_inet_address_free(addr);
  1923. return;
  1924. }
  1925. worker->nconns++;
  1926. session = g_malloc0(sizeof(*session));
  1927. REF_INIT_RETAIN(session, proxy_session_dtor);
  1928. session->client_sock = nfd;
  1929. session->client_addr = addr;
  1930. session->mirror_conns = g_ptr_array_sized_new(ctx->mirrors->len);
  1931. session->pool = rspamd_mempool_new(rspamd_mempool_suggest_size(),
  1932. "proxy", 0);
  1933. session->ctx = ctx;
  1934. session->worker = worker;
  1935. if (ctx->sessions_cache) {
  1936. rspamd_worker_session_cache_add(ctx->sessions_cache,
  1937. session->pool->tag.uid, &session->ref.refcount, session);
  1938. }
  1939. if (!ctx->milter) {
  1940. int http_opts = 0;
  1941. if (ctx->encrypted_only && !rspamd_inet_address_is_local(addr)) {
  1942. http_opts |= RSPAMD_HTTP_REQUIRE_ENCRYPTION;
  1943. }
  1944. session->client_conn = rspamd_http_connection_new_server(
  1945. ctx->http_ctx,
  1946. nfd,
  1947. NULL,
  1948. proxy_client_error_handler,
  1949. proxy_client_finish_handler,
  1950. http_opts);
  1951. if (ctx->key) {
  1952. rspamd_http_connection_set_key(session->client_conn, ctx->key);
  1953. }
  1954. msg_info_session("accepted http connection from %s port %d",
  1955. rspamd_inet_address_to_string(addr),
  1956. rspamd_inet_address_get_port(addr));
  1957. rspamd_http_connection_read_message_shared(session->client_conn,
  1958. session,
  1959. session->ctx->timeout);
  1960. }
  1961. else {
  1962. msg_info_session("accepted milter connection from %s port %d",
  1963. rspamd_inet_address_to_string(addr),
  1964. rspamd_inet_address_get_port(addr));
  1965. #ifdef TCP_NODELAY
  1966. #ifndef SOL_TCP
  1967. #define SOL_TCP IPPROTO_TCP
  1968. #endif
  1969. if (rspamd_inet_address_get_af(addr) != AF_UNIX) {
  1970. gint sopt = 1;
  1971. if (setsockopt(nfd, SOL_TCP, TCP_NODELAY, &sopt, sizeof(sopt)) ==
  1972. -1) {
  1973. msg_warn_session("cannot set TCP_NODELAY: %s",
  1974. strerror(errno));
  1975. }
  1976. }
  1977. #endif
  1978. rspamd_milter_handle_socket(nfd, 0.0,
  1979. session->pool,
  1980. ctx->event_loop,
  1981. proxy_milter_finish_handler,
  1982. proxy_milter_error_handler,
  1983. session);
  1984. }
  1985. }
  1986. static void
  1987. adjust_upstreams_limits(struct rspamd_proxy_ctx *ctx)
  1988. {
  1989. struct rspamd_http_upstream *backend;
  1990. gpointer k, v;
  1991. GHashTableIter it;
  1992. /*
  1993. * We set error time equal to max_retries * backend_timeout and max_errors
  1994. * to max_retries - 1
  1995. *
  1996. * So if we failed to scan a message on a backend for some reasons, we
  1997. * will try to re-resolve it faster
  1998. */
  1999. g_hash_table_iter_init(&it, ctx->upstreams);
  2000. while (g_hash_table_iter_next(&it, &k, &v)) {
  2001. backend = (struct rspamd_http_upstream *) v;
  2002. if (!backend->self_scan && backend->u) {
  2003. rspamd_upstreams_set_limits(backend->u,
  2004. NAN, NAN, ctx->max_retries * backend->timeout, NAN,
  2005. ctx->max_retries - 1, 0);
  2006. }
  2007. }
  2008. }
  2009. __attribute__((noreturn)) void
  2010. start_rspamd_proxy(struct rspamd_worker *worker)
  2011. {
  2012. struct rspamd_proxy_ctx *ctx = worker->ctx;
  2013. gboolean is_controller = FALSE;
  2014. g_assert(rspamd_worker_check_context(worker->ctx, rspamd_rspamd_proxy_magic));
  2015. ctx->cfg = worker->srv->cfg;
  2016. ctx->event_loop = rspamd_prepare_worker(worker, "rspamd_proxy",
  2017. proxy_accept_socket);
  2018. ctx->resolver = rspamd_dns_resolver_init(worker->srv->logger,
  2019. ctx->event_loop,
  2020. worker->srv->cfg);
  2021. rspamd_upstreams_library_config(worker->srv->cfg, ctx->cfg->ups_ctx,
  2022. ctx->event_loop, ctx->resolver->r);
  2023. ctx->http_ctx = rspamd_http_context_create(ctx->cfg, ctx->event_loop,
  2024. ctx->cfg->ups_ctx);
  2025. rspamd_mempool_add_destructor(ctx->cfg->cfg_pool,
  2026. (rspamd_mempool_destruct_t) rspamd_http_context_free,
  2027. ctx->http_ctx);
  2028. if (ctx->has_self_scan) {
  2029. /* Additional initialisation needed */
  2030. rspamd_worker_init_scanner(worker, ctx->event_loop, ctx->resolver,
  2031. &ctx->lang_det);
  2032. ctx->task_timeout = rspamd_worker_check_and_adjust_timeout(ctx->cfg, NAN);
  2033. is_controller = rspamd_worker_check_controller_presence(worker);
  2034. }
  2035. else {
  2036. worker->flags &= ~RSPAMD_WORKER_SCANNER;
  2037. }
  2038. if (worker->srv->cfg->enable_sessions_cache) {
  2039. ctx->sessions_cache = rspamd_worker_session_cache_new(worker,
  2040. ctx->event_loop);
  2041. }
  2042. ctx->milter_ctx.spam_header = ctx->spam_header;
  2043. ctx->milter_ctx.discard_on_reject = ctx->discard_on_reject;
  2044. ctx->milter_ctx.quarantine_on_reject = ctx->quarantine_on_reject;
  2045. ctx->milter_ctx.sessions_cache = ctx->sessions_cache;
  2046. ctx->milter_ctx.client_ca_name = ctx->client_ca_name;
  2047. ctx->milter_ctx.reject_message = ctx->reject_message;
  2048. ctx->milter_ctx.cfg = ctx->cfg;
  2049. rspamd_milter_init_library(&ctx->milter_ctx);
  2050. if (is_controller) {
  2051. rspamd_worker_init_controller(worker, NULL);
  2052. }
  2053. else {
  2054. if (ctx->has_self_scan) {
  2055. rspamd_map_watch(worker->srv->cfg, ctx->event_loop, ctx->resolver,
  2056. worker, RSPAMD_MAP_WATCH_SCANNER);
  2057. }
  2058. else {
  2059. rspamd_map_watch(worker->srv->cfg, ctx->event_loop, ctx->resolver,
  2060. worker, RSPAMD_MAP_WATCH_WORKER);
  2061. }
  2062. }
  2063. rspamd_lua_run_postloads(ctx->cfg->lua_state, ctx->cfg, ctx->event_loop,
  2064. worker);
  2065. adjust_upstreams_limits(ctx);
  2066. ev_loop(ctx->event_loop, 0);
  2067. rspamd_worker_block_signals();
  2068. if (ctx->has_self_scan) {
  2069. rspamd_stat_close();
  2070. }
  2071. if (is_controller) {
  2072. rspamd_controller_on_terminate(worker, NULL);
  2073. }
  2074. REF_RELEASE(ctx->cfg);
  2075. rspamd_log_close(worker->srv->logger);
  2076. rspamd_unset_crash_handler(worker->srv);
  2077. exit(EXIT_SUCCESS);
  2078. }