aboutsummaryrefslogtreecommitdiffstats
path: root/src/libserver/rspamd_control.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/libserver/rspamd_control.c')
-rw-r--r--src/libserver/rspamd_control.c209
1 files changed, 208 insertions, 1 deletions
diff --git a/src/libserver/rspamd_control.c b/src/libserver/rspamd_control.c
index 99b76058c..aa2edaf74 100644
--- a/src/libserver/rspamd_control.c
+++ b/src/libserver/rspamd_control.c
@@ -20,4 +20,211 @@
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */#include "rspamd_control.h"
+ */
+
+#include "config.h"
+#include "rspamd.h"
+#include "rspamd_control.h"
+#include "http.h"
+#include "unix-std.h"
+#include "utlist.h"
+
+static struct timeval io_timeout = {
+ .tv_sec = 30,
+ .tv_usec = 0
+};
+
+struct rspamd_control_reply_elt {
+ struct rspamd_control_reply reply;
+ struct event io_ev;
+ struct event tm_ev;
+ struct rspamd_worker *wrk;
+ struct rspamd_control_reply_elt *prev, *next;
+};
+
+struct rspamd_control_session {
+ gint fd;
+ struct rspamd_main *rspamd_main;
+ struct rspamd_http_connection *conn;
+ struct rspamd_control_command cmd;
+ struct rspamd_control_reply_elt *replies;
+ gboolean is_reply;
+};
+
+static const struct rspamd_control_cmd_match {
+ rspamd_ftok_t name;
+ enum rspamd_control_type type;
+} cmd_matches[] = {
+ {
+ .name = {
+ .begin = "/stat",
+ .len = 5
+ },
+ .type = RSPAMD_CONTROL_STAT
+ },
+ {
+ .name = {
+ .begin = "/reload",
+ .len = 7
+ },
+ .type = RSPAMD_CONTROL_RELOAD
+ },
+};
+
+void
+rspamd_control_send_error (struct rspamd_control_session *session,
+ gint code, const gchar *error_msg, ...)
+{
+ struct rspamd_http_message *msg;
+ va_list args;
+
+ msg = rspamd_http_new_message (HTTP_RESPONSE);
+
+ va_start (args, error_msg);
+ msg->status = rspamd_fstring_sized_new (128);
+ rspamd_vprintf_fstring (&msg->status, error_msg, args);
+ va_end (args);
+
+ msg->date = time (NULL);
+ msg->code = code;
+ msg->body = rspamd_fstring_sized_new (128);
+ rspamd_printf_fstring (&msg->body, "{\"error\":\"%V\"}", msg->status);
+ rspamd_http_connection_reset (session->conn);
+ rspamd_http_connection_write_message (session->conn,
+ msg,
+ NULL,
+ "application/json",
+ session,
+ session->fd,
+ &io_timeout,
+ session->rspamd_main->ev_base);
+}
+
+static void
+rspamd_control_send_ucl (struct rspamd_control_session *session,
+ ucl_object_t *obj)
+{
+ struct rspamd_http_message *msg;
+
+ msg = rspamd_http_new_message (HTTP_RESPONSE);
+ msg->date = time (NULL);
+ msg->code = 200;
+ msg->body = rspamd_fstring_sized_new (BUFSIZ);
+ rspamd_ucl_emit_fstring (obj, UCL_EMIT_JSON_COMPACT, &msg->body);
+ rspamd_http_connection_reset (session->conn);
+ rspamd_http_connection_write_message (session->conn,
+ msg,
+ NULL,
+ "application/json",
+ session,
+ session->fd,
+ &io_timeout,
+ session->rspamd_main->ev_base);
+}
+
+static void
+rspamd_control_connection_close (struct rspamd_control_session *session)
+{
+ struct rspamd_control_reply_elt *elt, *telt;
+
+ DL_FOREACH_SAFE (session->replies, elt, telt) {
+ g_slice_free1 (sizeof (*elt), elt);
+ }
+
+ rspamd_http_connection_unref (session->conn);
+ close (session->fd);
+ g_slice_free1 (sizeof (*session), session);
+}
+
+static void
+rspamd_control_error_handler (struct rspamd_http_connection *conn, GError *err)
+{
+ struct rspamd_control_session *session = conn->ud;
+
+ if (!session->is_reply) {
+ msg_info ("abnormally closing control connection: %e", err);
+ session->is_reply = TRUE;
+ rspamd_control_send_error (session, err->code, "%s", err->message);
+ }
+ else {
+ rspamd_control_connection_close (session);
+ }
+}
+
+static gint
+rspamd_control_finish_hadler (struct rspamd_http_connection *conn,
+ struct rspamd_http_message *msg)
+{
+ struct rspamd_control_session *session = conn->ud;
+ rspamd_ftok_t srch;
+ guint i;
+ gboolean found = FALSE;
+
+ if (!session->is_reply) {
+ if (msg->url == NULL) {
+ rspamd_control_connection_close (session);
+
+ return 0;
+ }
+
+ srch.begin = msg->url->str;
+ srch.len = msg->url->len;
+
+ session->is_reply = TRUE;
+
+ for (i = 0; i < G_N_ELEMENTS (cmd_matches); i++) {
+ if (rspamd_ftok_casecmp (&srch, &cmd_matches[i].name) == 0) {
+ session->cmd.type = cmd_matches[i].type;
+ found = TRUE;
+ break;
+ }
+ }
+
+ if (!found) {
+ rspamd_control_send_error (session, 404, "Command not defined");
+ }
+ else {
+ rspamd_control_send_error (session, 500, "Not implemented yet");
+ }
+ }
+ else {
+ rspamd_control_connection_close (session);
+ }
+
+
+ return 0;
+}
+
+void
+rspamd_control_process_client_socket (struct rspamd_main *rspamd_main,
+ gint fd)
+{
+ struct rspamd_control_session *session;
+
+ session = g_slice_alloc0 (sizeof (*session));
+
+ session->fd = fd;
+ session->conn = rspamd_http_connection_new (NULL, rspamd_control_error_handler,
+ rspamd_control_finish_hadler, 0, RSPAMD_HTTP_SERVER, NULL);
+ session->rspamd_main = rspamd_main;
+ rspamd_http_connection_read_message (session->conn, session, session->fd,
+ &io_timeout, rspamd_main->ev_base);
+}
+
+void
+rspamd_control_worker_add_default_handler (struct rspamd_worker *worker)
+{
+
+}
+
+/**
+ * Register custom handler for a specific control command for this worker
+ */
+void
+rspamd_control_worker_add_cmd_handler (struct rspamd_worker *worker,
+ enum rspamd_control_type type,
+ rspamd_worker_control_handler handler,
+ gpointer ud)
+{
+
+}