diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 21:30:40 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 21:30:40 +0000 |
commit | 133a45c109da5310add55824db21af5239951f93 (patch) | |
tree | ba6ac4c0a950a0dda56451944315d66409923918 /src/rspamd_proxy.c | |
parent | Initial commit. (diff) | |
download | rspamd-133a45c109da5310add55824db21af5239951f93.tar.xz rspamd-133a45c109da5310add55824db21af5239951f93.zip |
Adding upstream version 3.8.1.upstream/3.8.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r-- | src/rspamd_proxy.c | 2441 |
1 files changed, 2441 insertions, 0 deletions
diff --git a/src/rspamd_proxy.c b/src/rspamd_proxy.c new file mode 100644 index 0000000..838de06 --- /dev/null +++ b/src/rspamd_proxy.c @@ -0,0 +1,2441 @@ +/* + * Copyright 2023 Vsevolod Stakhov + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#include "config.h" +#include "libutil/util.h" +#include "libserver/maps/map.h" +#include "libutil/upstream.h" +#include "libserver/http/http_connection.h" +#include "libserver/http/http_private.h" +#include "libserver/protocol.h" +#include "libserver/protocol_internal.h" +#include "libserver/cfg_file.h" +#include "libserver/url.h" +#include "libserver/dns.h" +#include "libmime/message.h" +#include "rspamd.h" +#include "libserver/worker_util.h" +#include "worker_private.h" +#include "lua/lua_common.h" +#include "keypairs_cache.h" +#include "libstat/stat_api.h" +#include "ottery.h" +#include "unix-std.h" +#include "libserver/milter.h" +#include "libserver/milter_internal.h" +#include "libmime/lang_detection.h" + +#include <math.h> + +#ifdef HAVE_NETINET_TCP_H +#include <netinet/tcp.h> /* for TCP_NODELAY */ +#endif + +#ifdef SYS_ZSTD +#include "zstd.h" +#else +#include "contrib/zstd/zstd.h" +#endif + +/* Rotate keys each minute by default */ +#define DEFAULT_ROTATION_TIME 60.0 +#define DEFAULT_RETRIES 5 + +#define msg_err_session(...) rspamd_default_log_function(G_LOG_LEVEL_CRITICAL, \ + session->pool->tag.tagname, session->pool->tag.uid, \ + RSPAMD_LOG_FUNC, \ + __VA_ARGS__) +#define msg_warn_session(...) rspamd_default_log_function(G_LOG_LEVEL_WARNING, \ + session->pool->tag.tagname, session->pool->tag.uid, \ + RSPAMD_LOG_FUNC, \ + __VA_ARGS__) +#define msg_info_session(...) rspamd_default_log_function(G_LOG_LEVEL_INFO, \ + session->pool->tag.tagname, session->pool->tag.uid, \ + RSPAMD_LOG_FUNC, \ + __VA_ARGS__) + +#define msg_debug_session(...) rspamd_conditional_debug_fast(NULL, session->client_addr, \ + rspamd_proxy_log_id, "proxy", session->pool->tag.uid, \ + RSPAMD_LOG_FUNC, \ + __VA_ARGS__) + +INIT_LOG_MODULE(proxy) + +gpointer init_rspamd_proxy(struct rspamd_config *cfg); +void start_rspamd_proxy(struct rspamd_worker *worker); + +worker_t rspamd_proxy_worker = { + "rspamd_proxy", /* Name */ + init_rspamd_proxy, /* Init function */ + start_rspamd_proxy, /* Start function */ + RSPAMD_WORKER_HAS_SOCKET | RSPAMD_WORKER_KILLABLE | RSPAMD_WORKER_SCANNER, + RSPAMD_WORKER_SOCKET_TCP, /* TCP socket */ + RSPAMD_WORKER_VER}; + +struct rspamd_http_upstream { + gchar *name; + gchar *settings_id; + struct upstream_list *u; + struct rspamd_cryptobox_pubkey *key; + gdouble timeout; + gint parser_from_ref; + gint parser_to_ref; + gboolean local; + gboolean self_scan; + gboolean compress; +}; + +struct rspamd_http_mirror { + gchar *name; + gchar *settings_id; + struct upstream_list *u; + struct rspamd_cryptobox_pubkey *key; + gdouble prob; + gdouble timeout; + gint parser_from_ref; + gint parser_to_ref; + gboolean local; + gboolean compress; +}; + +static const guint64 rspamd_rspamd_proxy_magic = 0xcdeb4fd1fc351980ULL; + +struct rspamd_proxy_ctx { + guint64 magic; + /* Events base */ + struct ev_loop *event_loop; + /* DNS resolver */ + struct rspamd_dns_resolver *resolver; + /* Config */ + struct rspamd_config *cfg; + /* END OF COMMON PART */ + gdouble timeout; + /* Encryption key for clients */ + struct rspamd_cryptobox_keypair *key; + /* HTTP context */ + struct rspamd_http_context *http_ctx; + /* Upstreams to use */ + GHashTable *upstreams; + /* Mirrors to send traffic to */ + GPtrArray *mirrors; + /* Default upstream */ + struct rspamd_http_upstream *default_upstream; + lua_State *lua_state; + /* Array of callback functions called on end of scan to compare results */ + GArray *cmp_refs; + /* Maximum count for retries */ + guint max_retries; + gboolean encrypted_only; + /* If we have self_scanning backends, we need to work as a normal worker */ + gboolean has_self_scan; + /* It is not HTTP but milter proxy */ + gboolean milter; + /* Discard messages instead of rejecting them */ + gboolean discard_on_reject; + /* Quarantine messages instead of rejecting them */ + gboolean quarantine_on_reject; + /* Milter spam header */ + gchar *spam_header; + /* CA name that can be used for client certificates */ + gchar *client_ca_name; + /* Milter rejection message */ + gchar *reject_message; + /* Sessions cache */ + void *sessions_cache; + struct rspamd_milter_context milter_ctx; + /* Language detector */ + struct rspamd_lang_detector *lang_det; + gdouble task_timeout; +}; + +enum rspamd_backend_flags { + RSPAMD_BACKEND_REPLIED = 1 << 0, + RSPAMD_BACKEND_CLOSED = 1 << 1, + RSPAMD_BACKEND_PARSED = 1 << 2, +}; + +struct rspamd_proxy_session; + +struct rspamd_proxy_backend_connection { + const gchar *name; + struct rspamd_cryptobox_keypair *local_key; + struct rspamd_cryptobox_pubkey *remote_key; + struct upstream *up; + struct rspamd_http_connection *backend_conn; + ucl_object_t *results; + const gchar *err; + struct rspamd_proxy_session *s; + gint backend_sock; + ev_tstamp timeout; + enum rspamd_backend_flags flags; + gint parser_from_ref; + gint parser_to_ref; + struct rspamd_task *task; +}; + +enum rspamd_proxy_legacy_support { + LEGACY_SUPPORT_NO = 0, + LEGACY_SUPPORT_RSPAMC, + LEGACY_SUPPORT_SPAMC +}; + +struct rspamd_proxy_session { + struct rspamd_worker *worker; + rspamd_mempool_t *pool; + struct rspamd_proxy_ctx *ctx; + rspamd_inet_addr_t *client_addr; + struct rspamd_http_connection *client_conn; + struct rspamd_milter_session *client_milter_conn; + struct rspamd_http_upstream *backend; + gpointer map; + gchar *fname; + gpointer shmem_ref; + struct rspamd_proxy_backend_connection *master_conn; + struct rspamd_http_message *client_message; + GPtrArray *mirror_conns; + gsize map_len; + gint client_sock; + enum rspamd_proxy_legacy_support legacy_support; + gint retries; + ref_entry_t ref; +}; + +static gboolean proxy_send_master_message(struct rspamd_proxy_session *session); + +static GQuark +rspamd_proxy_quark(void) +{ + return g_quark_from_static_string("rspamd-proxy"); +} + +static gboolean +rspamd_proxy_parse_lua_parser(lua_State *L, const ucl_object_t *obj, + gint *ref_from, gint *ref_to, GError **err) +{ + const gchar *lua_script; + gsize slen; + gint err_idx, ref_idx; + gboolean has_ref = FALSE; + + g_assert(obj != NULL); + g_assert(ref_from != NULL); + g_assert(ref_to != NULL); + + *ref_from = -1; + *ref_to = -1; + + lua_script = ucl_object_tolstring(obj, &slen); + lua_pushcfunction(L, &rspamd_lua_traceback); + err_idx = lua_gettop(L); + + /* Load data */ + if (luaL_loadbuffer(L, lua_script, slen, "proxy parser") != 0) { + g_set_error(err, + rspamd_proxy_quark(), + EINVAL, + "cannot load lua parser script: %s", + lua_tostring(L, -1)); + lua_settop(L, 0); /* Error function */ + + return FALSE; + } + + /* Now do it */ + if (lua_pcall(L, 0, 1, err_idx) != 0) { + g_set_error(err, + rspamd_proxy_quark(), + EINVAL, + "cannot init lua parser script: %s", + lua_tostring(L, -1)); + lua_settop(L, 0); + + return FALSE; + } + + if (lua_istable(L, -1)) { + /* + * We have a table, so we check for two keys: + * 'from' -> function + * 'to' -> function + * + * From converts parent request to a client one + * To converts client request to a parent one + */ + lua_pushstring(L, "from"); + lua_gettable(L, -2); + + if (lua_isfunction(L, -1)) { + ref_idx = luaL_ref(L, LUA_REGISTRYINDEX); + *ref_from = ref_idx; + has_ref = TRUE; + } + + lua_pushstring(L, "to"); + lua_gettable(L, -2); + + if (lua_isfunction(L, -1)) { + ref_idx = luaL_ref(L, LUA_REGISTRYINDEX); + *ref_to = ref_idx; + has_ref = TRUE; + } + } + else if (!lua_isfunction(L, -1)) { + g_set_error(err, + rspamd_proxy_quark(), + EINVAL, + "cannot init lua parser script: " + "must return function"); + lua_settop(L, 0); + + return FALSE; + } + else { + /* Just parser from protocol */ + ref_idx = luaL_ref(L, LUA_REGISTRYINDEX); + *ref_from = ref_idx; + lua_settop(L, 0); + has_ref = TRUE; + } + + return has_ref; +} + +static gboolean +rspamd_proxy_parse_upstream(rspamd_mempool_t *pool, + const ucl_object_t *obj, + gpointer ud, + struct rspamd_rcl_section *section, + GError **err) +{ + const ucl_object_t *elt; + struct rspamd_http_upstream *up = NULL; + struct rspamd_proxy_ctx *ctx; + struct rspamd_rcl_struct_parser *pd = ud; + lua_State *L; + + ctx = pd->user_struct; + L = ctx->lua_state; + + if (ucl_object_type(obj) != UCL_OBJECT) { + if (ucl_object_type(obj) != UCL_NULL) { + msg_info_pool_check("upstream %s is disabled by setting it to NULL", + ucl_object_key(obj)); + return TRUE; + } + + g_set_error(err, rspamd_proxy_quark(), 100, + "upstream option must be an object"); + + return FALSE; + } + + if (!rspamd_config_is_enabled_from_ucl(pool, obj)) { + /* Upstream is valid but disabled */ + msg_info_pool_check("upstream %s is disabled", + ucl_object_lookup(obj, "name") ? ucl_object_tostring(ucl_object_lookup(obj, "name")) : ucl_object_key(obj)); + return TRUE; + } + + up = rspamd_mempool_alloc0(pool, sizeof(*up)); + + elt = ucl_object_lookup(obj, "name"); + if (elt == NULL) { + + if (ucl_object_key(obj)) { + if (strcmp(ucl_object_key(obj), "upstream") == 0) { + /* Iterate over the object and find upstream elements */ + ucl_object_iter_t it = NULL; + const ucl_object_t *cur; + gboolean ret = TRUE; + + while ((cur = ucl_object_iterate(obj, &it, true)) != NULL) { + if (!rspamd_proxy_parse_upstream(pool, cur, ud, + section, err)) { + ret = FALSE; + } + } + + return ret; + } + else { + /* Inside upstream */ + up->name = rspamd_mempool_strdup(pool, ucl_object_key(obj)); + } + } + else { + g_set_error(err, rspamd_proxy_quark(), 100, + "upstream option must have some name definition"); + + return FALSE; + } + } + else { + up->name = rspamd_mempool_strdup(pool, ucl_object_tostring(elt)); + } + + up->parser_from_ref = -1; + up->parser_to_ref = -1; + up->timeout = ctx->timeout; + + elt = ucl_object_lookup(obj, "key"); + if (elt != NULL) { + up->key = rspamd_pubkey_from_base32(ucl_object_tostring(elt), 0, + RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519); + + if (up->key == NULL) { + g_set_error(err, rspamd_proxy_quark(), 100, + "cannot read upstream key"); + + goto err; + } + + rspamd_mempool_add_destructor(pool, + (rspamd_mempool_destruct_t) rspamd_pubkey_unref, up->key); + } + + elt = ucl_object_lookup(obj, "self_scan"); + if (elt && ucl_object_toboolean(elt)) { + up->self_scan = TRUE; + ctx->has_self_scan = TRUE; + } + + elt = ucl_object_lookup_any(obj, "compress", "compression", NULL); + if (elt && ucl_object_toboolean(elt)) { + up->compress = TRUE; + } + + elt = ucl_object_lookup(obj, "hosts"); + + if (elt == NULL && !up->self_scan) { + g_set_error(err, rspamd_proxy_quark(), 100, + "upstream option must have some hosts definition"); + + goto err; + } + + if (elt) { + up->u = rspamd_upstreams_create(ctx->cfg->ups_ctx); + + if (!rspamd_upstreams_from_ucl(up->u, elt, 11333, NULL)) { + g_set_error(err, rspamd_proxy_quark(), 100, + "upstream has bad hosts definition"); + + goto err; + } + + rspamd_mempool_add_destructor(pool, + (rspamd_mempool_destruct_t) rspamd_upstreams_destroy, up->u); + } + + elt = ucl_object_lookup(obj, "default"); + if (elt) { + if (ucl_object_toboolean(elt)) { + ctx->default_upstream = up; + } + } + else if (up->self_scan) { + ctx->default_upstream = up; + } + + + elt = ucl_object_lookup(obj, "local"); + if (elt && ucl_object_toboolean(elt)) { + up->local = TRUE; + } + + elt = ucl_object_lookup(obj, "timeout"); + if (elt) { + ucl_object_todouble_safe(elt, &up->timeout); + } + + elt = ucl_object_lookup_any(obj, "settings", "settings_id", NULL); + if (elt && ucl_object_type(elt) == UCL_STRING) { + up->settings_id = rspamd_mempool_strdup(pool, ucl_object_tostring(elt)); + } + + /* + * Accept lua function here in form + * fun :: String -> UCL + */ + elt = ucl_object_lookup(obj, "parser"); + if (elt) { + if (!rspamd_proxy_parse_lua_parser(L, elt, &up->parser_from_ref, + &up->parser_to_ref, err)) { + goto err; + } + + rspamd_lua_add_ref_dtor(L, pool, up->parser_from_ref); + rspamd_lua_add_ref_dtor(L, pool, up->parser_to_ref); + } + + g_hash_table_insert(ctx->upstreams, up->name, up); + + return TRUE; + +err: + return FALSE; +} + +static gboolean +rspamd_proxy_parse_mirror(rspamd_mempool_t *pool, + const ucl_object_t *obj, + gpointer ud, + struct rspamd_rcl_section *section, + GError **err) +{ + const ucl_object_t *elt; + struct rspamd_http_mirror *up = NULL; + struct rspamd_proxy_ctx *ctx; + struct rspamd_rcl_struct_parser *pd = ud; + lua_State *L; + + ctx = pd->user_struct; + L = ctx->lua_state; + + if (ucl_object_type(obj) != UCL_OBJECT) { + if (ucl_object_type(obj) != UCL_NULL) { + msg_info_pool_check("mirror %s is disabled by setting it to NULL", + ucl_object_key(obj)); + return TRUE; + } + + g_set_error(err, rspamd_proxy_quark(), 100, + "mirror option must be an object"); + + return FALSE; + } + + if (!rspamd_config_is_enabled_from_ucl(pool, obj)) { + /* Upstream is valid but disabled */ + msg_info_pool_check("mirror %s is disabled", + ucl_object_lookup(obj, "name") ? ucl_object_tostring(ucl_object_lookup(obj, "name")) : ucl_object_key(obj)); + return TRUE; + } + + up = rspamd_mempool_alloc0(pool, sizeof(*up)); + + elt = ucl_object_lookup(obj, "name"); + if (elt == NULL) { + + if (ucl_object_key(obj)) { + if (strcmp(ucl_object_key(obj), "mirror") == 0) { + /* Iterate over the object and find upstream elements */ + ucl_object_iter_t it = NULL; + const ucl_object_t *cur; + gboolean ret = TRUE; + + while ((cur = ucl_object_iterate(obj, &it, true)) != NULL) { + if (!rspamd_proxy_parse_mirror(pool, cur, ud, + section, err)) { + ret = FALSE; + } + } + + return ret; + } + else { + /* Inside upstream */ + up->name = rspamd_mempool_strdup(pool, ucl_object_key(obj)); + } + } + else { + g_set_error(err, rspamd_proxy_quark(), 100, + "mirror option must have some name definition"); + + return FALSE; + } + } + else { + up->name = rspamd_mempool_strdup(pool, ucl_object_tostring(elt)); + } + + up->parser_to_ref = -1; + up->parser_from_ref = -1; + up->timeout = ctx->timeout; + + elt = ucl_object_lookup(obj, "key"); + if (elt != NULL) { + up->key = rspamd_pubkey_from_base32(ucl_object_tostring(elt), 0, + RSPAMD_KEYPAIR_KEX, RSPAMD_CRYPTOBOX_MODE_25519); + + if (up->key == NULL) { + g_set_error(err, rspamd_proxy_quark(), 100, + "cannot read mirror key"); + + goto err; + } + + rspamd_mempool_add_destructor(pool, + (rspamd_mempool_destruct_t) rspamd_pubkey_unref, up->key); + } + + elt = ucl_object_lookup(obj, "hosts"); + + if (elt == NULL) { + g_set_error(err, rspamd_proxy_quark(), 100, + "mirror option must have some hosts definition"); + + goto err; + } + + up->u = rspamd_upstreams_create(ctx->cfg->ups_ctx); + if (!rspamd_upstreams_from_ucl(up->u, elt, 11333, NULL)) { + g_set_error(err, rspamd_proxy_quark(), 100, + "mirror has bad hosts definition"); + + goto err; + } + + rspamd_mempool_add_destructor(pool, + (rspamd_mempool_destruct_t) rspamd_upstreams_destroy, up->u); + + elt = ucl_object_lookup_any(obj, "probability", "prob", NULL); + if (elt) { + up->prob = ucl_object_todouble(elt); + } + else { + up->prob = 1.0; + } + + elt = ucl_object_lookup(obj, "local"); + if (elt && ucl_object_toboolean(elt)) { + up->local = TRUE; + } + + elt = ucl_object_lookup_any(obj, "compress", "compression", NULL); + if (elt && ucl_object_toboolean(elt)) { + up->compress = TRUE; + } + + elt = ucl_object_lookup(obj, "timeout"); + if (elt) { + ucl_object_todouble_safe(elt, &up->timeout); + } + + /* + * Accept lua function here in form + * fun :: String -> UCL + */ + elt = ucl_object_lookup(obj, "parser"); + if (elt) { + if (!rspamd_proxy_parse_lua_parser(L, elt, &up->parser_from_ref, + &up->parser_to_ref, err)) { + goto err; + } + + rspamd_lua_add_ref_dtor(L, pool, up->parser_from_ref); + rspamd_lua_add_ref_dtor(L, pool, up->parser_to_ref); + } + + elt = ucl_object_lookup_any(obj, "settings", "settings_id", NULL); + if (elt && ucl_object_type(elt) == UCL_STRING) { + up->settings_id = rspamd_mempool_strdup(pool, ucl_object_tostring(elt)); + } + + g_ptr_array_add(ctx->mirrors, up); + + return TRUE; + +err: + + return FALSE; +} + +static gboolean +rspamd_proxy_parse_script(rspamd_mempool_t *pool, + const ucl_object_t *obj, + gpointer ud, + struct rspamd_rcl_section *section, + GError **err) +{ + struct rspamd_proxy_ctx *ctx; + struct rspamd_rcl_struct_parser *pd = ud; + lua_State *L; + const gchar *lua_script; + gsize slen; + gint err_idx, ref_idx; + struct stat st; + + ctx = pd->user_struct; + L = ctx->lua_state; + + if (ucl_object_type(obj) != UCL_STRING) { + g_set_error(err, rspamd_proxy_quark(), 100, + "script option must be a string with file or lua chunk"); + + return FALSE; + } + + lua_script = ucl_object_tolstring(obj, &slen); + lua_pushcfunction(L, &rspamd_lua_traceback); + err_idx = lua_gettop(L); + + if (stat(lua_script, &st) != -1) { + /* Load file */ + if (luaL_loadfile(L, lua_script) != 0) { + g_set_error(err, + rspamd_proxy_quark(), + EINVAL, + "cannot load lua parser script: %s", + lua_tostring(L, -1)); + lua_settop(L, 0); /* Error function */ + + goto err; + } + } + else { + /* Load data directly */ + if (luaL_loadbuffer(L, lua_script, slen, "proxy parser") != 0) { + g_set_error(err, + rspamd_proxy_quark(), + EINVAL, + "cannot load lua parser script: %s", + lua_tostring(L, -1)); + lua_settop(L, 0); /* Error function */ + + goto err; + } + } + + /* Now do it */ + if (lua_pcall(L, 0, 1, err_idx) != 0) { + g_set_error(err, + rspamd_proxy_quark(), + EINVAL, + "cannot init lua parser script: %s", + lua_tostring(L, -1)); + lua_settop(L, 0); + + goto err; + } + + if (!lua_isfunction(L, -1)) { + g_set_error(err, + rspamd_proxy_quark(), + EINVAL, + "cannot init lua parser script: " + "must return function, %s returned", + lua_typename(L, lua_type(L, -1))); + lua_settop(L, 0); + + goto err; + } + + ref_idx = luaL_ref(L, LUA_REGISTRYINDEX); + lua_settop(L, 0); + g_array_append_val(ctx->cmp_refs, ref_idx); + + return TRUE; + +err: + return FALSE; +} + +gpointer +init_rspamd_proxy(struct rspamd_config *cfg) +{ + struct rspamd_proxy_ctx *ctx; + GQuark type; + + type = g_quark_try_string("rspamd_proxy"); + + ctx = rspamd_mempool_alloc0(cfg->cfg_pool, + sizeof(struct rspamd_proxy_ctx)); + ctx->magic = rspamd_rspamd_proxy_magic; + ctx->timeout = 120.0; + ctx->upstreams = g_hash_table_new(rspamd_strcase_hash, rspamd_strcase_equal); + rspamd_mempool_add_destructor(cfg->cfg_pool, + (rspamd_mempool_destruct_t) g_hash_table_unref, ctx->upstreams); + ctx->mirrors = g_ptr_array_new(); + rspamd_mempool_add_destructor(cfg->cfg_pool, + (rspamd_mempool_destruct_t) rspamd_ptr_array_free_hard, ctx->mirrors); + ctx->cfg = cfg; + ctx->lua_state = cfg->lua_state; + ctx->cmp_refs = g_array_new(FALSE, FALSE, sizeof(gint)); + rspamd_mempool_add_destructor(cfg->cfg_pool, + (rspamd_mempool_destruct_t) rspamd_array_free_hard, ctx->cmp_refs); + ctx->max_retries = DEFAULT_RETRIES; + ctx->spam_header = RSPAMD_MILTER_SPAM_HEADER; + + rspamd_rcl_register_worker_option(cfg, + type, + "timeout", + rspamd_rcl_parse_struct_time, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, timeout), + RSPAMD_CL_FLAG_TIME_FLOAT, + "IO timeout"); + rspamd_rcl_register_worker_option(cfg, + type, + "keypair", + rspamd_rcl_parse_struct_keypair, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, key), + 0, + "Server's keypair"); + rspamd_rcl_register_worker_option(cfg, + type, + "encrypted_only", + rspamd_rcl_parse_struct_boolean, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, encrypted_only), + 0, + "Allow only encrypted connections"); + rspamd_rcl_register_worker_option(cfg, + type, + "upstream", + rspamd_proxy_parse_upstream, + ctx, + 0, + 0, + "List of upstreams"); + rspamd_rcl_register_worker_option(cfg, + type, + "mirror", + rspamd_proxy_parse_mirror, + ctx, + 0, + RSPAMD_CL_FLAG_MULTIPLE, + "List of mirrors"); + + rspamd_rcl_register_worker_option(cfg, + type, + "script", + rspamd_proxy_parse_script, + ctx, + 0, + RSPAMD_CL_FLAG_MULTIPLE, + "Compare script to be executed"); + rspamd_rcl_register_worker_option(cfg, + type, + "max_retries", + rspamd_rcl_parse_struct_integer, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, max_retries), + RSPAMD_CL_FLAG_UINT, + "Maximum number of retries for master connection"); + rspamd_rcl_register_worker_option(cfg, + type, + "milter", + rspamd_rcl_parse_struct_boolean, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, milter), + 0, + "Accept milter connections, not HTTP"); + rspamd_rcl_register_worker_option(cfg, + type, + "discard_on_reject", + rspamd_rcl_parse_struct_boolean, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, discard_on_reject), + 0, + "Tell MTA to discard rejected messages silently"); + rspamd_rcl_register_worker_option(cfg, + type, + "quarantine_on_reject", + rspamd_rcl_parse_struct_boolean, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, quarantine_on_reject), + 0, + "Tell MTA to quarantine rejected messages"); + rspamd_rcl_register_worker_option(cfg, + type, + "spam_header", + rspamd_rcl_parse_struct_string, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, spam_header), + 0, + "Use the specific spam header (default: X-Spam)"); + rspamd_rcl_register_worker_option(cfg, + type, + "client_ca_name", + rspamd_rcl_parse_struct_string, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, client_ca_name), + 0, + "Allow certificates issued by this CA to be treated as client certificates"); + rspamd_rcl_register_worker_option(cfg, + type, + "reject_message", + rspamd_rcl_parse_struct_string, + ctx, + G_STRUCT_OFFSET(struct rspamd_proxy_ctx, reject_message), + 0, + "Use custom rejection message"); + + return ctx; +} + +static void +proxy_backend_close_connection(struct rspamd_proxy_backend_connection *conn) +{ + if (conn && !(conn->flags & RSPAMD_BACKEND_CLOSED)) { + if (conn->backend_conn) { + rspamd_http_connection_reset(conn->backend_conn); + rspamd_http_connection_unref(conn->backend_conn); + close(conn->backend_sock); + } + + conn->flags |= RSPAMD_BACKEND_CLOSED; + } +} + +static gboolean +proxy_backend_parse_results(struct rspamd_proxy_session *session, + struct rspamd_proxy_backend_connection *conn, + lua_State *L, gint parser_ref, + struct rspamd_http_message *msg, + goffset *body_offset, + const rspamd_ftok_t *ct) +{ + struct ucl_parser *parser; + gint err_idx; + const gchar *in = msg->body_buf.begin; + gsize inlen = msg->body_buf.len; + const rspamd_ftok_t *offset_hdr; + + if (inlen == 0 || in == NULL) { + return FALSE; + } + + offset_hdr = rspamd_http_message_find_header(msg, MESSAGE_OFFSET_HEADER); + + if (offset_hdr) { + gulong val; + + if (rspamd_strtoul(offset_hdr->begin, offset_hdr->len, &val) && val < inlen) { + + if (body_offset) { + *body_offset = val; + } + inlen = val; + } + } + + if (parser_ref != -1) { + /* Call parser function */ + lua_pushcfunction(L, &rspamd_lua_traceback); + err_idx = lua_gettop(L); + + lua_rawgeti(L, LUA_REGISTRYINDEX, parser_ref); + /* XXX: copies all data */ + lua_pushlstring(L, in, inlen); + + if (lua_pcall(L, 1, 1, err_idx) != 0) { + msg_err_session( + "cannot run lua parser script: %s", + lua_tostring(L, -1)); + lua_settop(L, 0); + + return FALSE; + } + + conn->results = ucl_object_lua_import(L, -1); + lua_settop(L, 0); + } + else { + rspamd_ftok_t json_ct; + RSPAMD_FTOK_ASSIGN(&json_ct, "application/json"); + + if (ct && rspamd_ftok_casecmp(ct, &json_ct) == 0) { + parser = ucl_parser_new(0); + + if (!ucl_parser_add_chunk(parser, in, inlen)) { + gchar *encoded; + + encoded = rspamd_encode_base64(in, inlen, 0, NULL); + msg_err_session("cannot parse input: %s", ucl_parser_get_error( + parser)); + msg_err_session("input encoded: %s", encoded); + ucl_parser_free(parser); + g_free(encoded); + + return FALSE; + } + + conn->results = ucl_parser_get_object(parser); + ucl_parser_free(parser); + } + } + + return TRUE; +} + +static void +proxy_call_cmp_script(struct rspamd_proxy_session *session, gint cbref) +{ + gint err_idx; + guint i; + struct rspamd_proxy_backend_connection *conn; + lua_State *L; + + L = session->ctx->lua_state; + lua_pushcfunction(L, &rspamd_lua_traceback); + err_idx = lua_gettop(L); + + lua_rawgeti(L, LUA_REGISTRYINDEX, cbref); + + lua_createtable(L, 0, session->mirror_conns->len + 1); + /* Now push master results */ + if (session->master_conn && session->master_conn->results) { + lua_pushstring(L, "master"); + ucl_object_push_lua(L, session->master_conn->results, true); + lua_settable(L, -3); + } + else { + lua_pushstring(L, "master"); + lua_pushstring(L, "no results"); + lua_settable(L, -3); + } + + for (i = 0; i < session->mirror_conns->len; i++) { + conn = g_ptr_array_index(session->mirror_conns, i); + + if (conn->results) { + lua_pushstring(L, conn->name); + ucl_object_push_lua(L, conn->results, true); + lua_settable(L, -3); + } + else { + lua_pushstring(L, conn->name); + lua_pushstring(L, conn->err ? conn->err : "unknown error"); + lua_settable(L, -3); + } + } + + gchar log_tag[RSPAMD_LOG_ID_LEN + 1]; + rspamd_strlcpy(log_tag, session->pool->tag.uid, sizeof(log_tag)); + lua_pushstring(L, log_tag); + + if (lua_pcall(L, 2, 0, err_idx) != 0) { + msg_err_session( + "cannot run lua compare script: %s", + lua_tostring(L, -1)); + } + + lua_settop(L, err_idx - 1); +} + +static void +proxy_session_dtor(struct rspamd_proxy_session *session) +{ + guint i; + gint cbref; + struct rspamd_proxy_backend_connection *conn; + + if (session->master_conn && session->master_conn->results) { + for (i = 0; i < session->ctx->cmp_refs->len; i++) { + cbref = g_array_index(session->ctx->cmp_refs, gint, i); + proxy_call_cmp_script(session, cbref); + } + } + + if (session->master_conn) { + proxy_backend_close_connection(session->master_conn); + } + + if (session->client_milter_conn) { + rspamd_milter_session_unref(session->client_milter_conn); + } + else if (session->client_conn) { + rspamd_http_connection_reset(session->client_conn); + rspamd_http_connection_unref(session->client_conn); + } + + if (session->map && session->map_len) { + munmap(session->map, session->map_len); + } + + for (i = 0; i < session->mirror_conns->len; i++) { + conn = g_ptr_array_index(session->mirror_conns, i); + + if (!(conn->flags & RSPAMD_BACKEND_CLOSED)) { + proxy_backend_close_connection(conn); + } + + if (conn->results) { + ucl_object_unref(conn->results); + } + } + + if (session->master_conn) { + if (session->master_conn->results) { + ucl_object_unref(session->master_conn->results); + } + + if (session->master_conn->task) { + rspamd_session_destroy(session->master_conn->task->s); + } + } + + g_ptr_array_free(session->mirror_conns, TRUE); + rspamd_http_message_shmem_unref(session->shmem_ref); + rspamd_http_message_unref(session->client_message); + + if (session->client_addr) { + rspamd_inet_address_free(session->client_addr); + } + + if (session->client_sock != -1) { + close(session->client_sock); + } + + if (session->ctx->sessions_cache) { + rspamd_worker_session_cache_remove(session->ctx->sessions_cache, + session); + } + + if (session->pool) { + rspamd_mempool_delete(session->pool); + } + + g_free(session); +} + +static void +proxy_request_compress(struct rspamd_http_message *msg) +{ + guint flags; + ZSTD_CCtx *zctx; + rspamd_fstring_t *body; + const gchar *in; + gsize inlen; + + flags = rspamd_http_message_get_flags(msg); + + if (!rspamd_http_message_find_header(msg, COMPRESSION_HEADER)) { + if ((flags & RSPAMD_HTTP_FLAG_SHMEM) || + !(flags & RSPAMD_HTTP_FLAG_HAS_BODY)) { + /* Cannot compress shared or empty message */ + return; + } + + in = rspamd_http_message_get_body(msg, &inlen); + + if (in == NULL || inlen == 0) { + return; + } + + body = rspamd_fstring_sized_new(ZSTD_compressBound(inlen)); + zctx = ZSTD_createCCtx(); + body->len = ZSTD_compressCCtx(zctx, body->str, body->allocated, + in, inlen, 1); + + if (ZSTD_isError(body->len)) { + msg_err("compression error"); + rspamd_fstring_free(body); + ZSTD_freeCCtx(zctx); + + return; + } + + ZSTD_freeCCtx(zctx); + rspamd_http_message_set_body_from_fstring_steal(msg, body); + rspamd_http_message_add_header(msg, COMPRESSION_HEADER, "zstd"); + } +} + +static void +proxy_request_decompress(struct rspamd_http_message *msg) +{ + rspamd_fstring_t *body; + const gchar *in; + gsize inlen, outlen, r; + ZSTD_DStream *zstream; + ZSTD_inBuffer zin; + ZSTD_outBuffer zout; + + if (rspamd_http_message_find_header(msg, COMPRESSION_HEADER)) { + in = rspamd_http_message_get_body(msg, &inlen); + + if (in == NULL || inlen == 0) { + return; + } + + zstream = ZSTD_createDStream(); + ZSTD_initDStream(zstream); + + zin.pos = 0; + zin.src = in; + zin.size = inlen; + + if ((outlen = ZSTD_getDecompressedSize(zin.src, zin.size)) == 0) { + outlen = ZSTD_DStreamOutSize(); + } + + body = rspamd_fstring_sized_new(outlen); + zout.dst = body->str; + zout.pos = 0; + zout.size = outlen; + + while (zin.pos < zin.size) { + r = ZSTD_decompressStream(zstream, &zout, &zin); + + if (ZSTD_isError(r)) { + msg_err("Decompression error: %s", ZSTD_getErrorName(r)); + ZSTD_freeDStream(zstream); + rspamd_fstring_free(body); + + return; + } + + if (zout.pos == zout.size) { + /* We need to extend output buffer */ + zout.size = zout.size * 2 + 1; + body = rspamd_fstring_grow(body, zout.size); + zout.size = body->allocated; + zout.dst = body->str; + } + } + + body->len = zout.pos; + ZSTD_freeDStream(zstream); + rspamd_http_message_set_body_from_fstring_steal(msg, body); + rspamd_http_message_remove_header(msg, COMPRESSION_HEADER); + } +} + +static struct rspamd_proxy_session * +proxy_session_refresh(struct rspamd_proxy_session *session) +{ + struct rspamd_proxy_session *nsession; + + nsession = g_malloc0(sizeof(*nsession)); + nsession->client_milter_conn = session->client_milter_conn; + session->client_milter_conn = NULL; + rspamd_milter_update_userdata(nsession->client_milter_conn, + nsession); + nsession->client_addr = session->client_addr; + session->client_addr = NULL; + nsession->ctx = session->ctx; + nsession->worker = session->worker; + nsession->pool = rspamd_mempool_new(rspamd_mempool_suggest_size(), "proxy", 0); + nsession->client_sock = session->client_sock; + session->client_sock = -1; + nsession->mirror_conns = g_ptr_array_sized_new(nsession->ctx->mirrors->len); + + REF_INIT_RETAIN(nsession, proxy_session_dtor); + + if (nsession->ctx->sessions_cache) { + rspamd_worker_session_cache_add(nsession->ctx->sessions_cache, + nsession->pool->tag.uid, &nsession->ref.refcount, nsession); + } + + return nsession; +} + +static gboolean +proxy_check_file(struct rspamd_http_message *msg, + struct rspamd_proxy_session *session) +{ + const rspamd_ftok_t *tok, *key_tok; + rspamd_ftok_t srch; + gchar *file_str; + GHashTable *query_args; + GHashTableIter it; + gpointer k, v; + struct http_parser_url u; + rspamd_fstring_t *new_url; + + tok = rspamd_http_message_find_header(msg, "File"); + + if (tok) { + file_str = rspamd_mempool_ftokdup(session->pool, tok); + session->map = rspamd_file_xmap(file_str, PROT_READ, &session->map_len, + TRUE); + + if (session->map == NULL) { + if (session->map_len != 0) { + msg_err_session("cannot map %s: %s", file_str, + strerror(errno)); + + return FALSE; + } + } + /* Remove header after processing */ + rspamd_http_message_remove_header(msg, "File"); + session->fname = file_str; + } + else { + /* Need to parse query URL */ + if (http_parser_parse_url(RSPAMD_FSTRING_DATA(msg->url), + RSPAMD_FSTRING_LEN(msg->url), 0, &u) != 0) { + msg_err_session("bad request url: %V", msg->url); + + return FALSE; + } + + if (u.field_set & (1 << UF_QUERY)) { + /* In case if we have a query, we need to store it somewhere */ + query_args = rspamd_http_message_parse_query(msg); + srch.begin = "File"; + srch.len = strlen("File"); + tok = g_hash_table_lookup(query_args, &srch); + + if (tok) { + file_str = rspamd_mempool_ftokdup(session->pool, tok); + session->map = rspamd_file_xmap(file_str, PROT_READ, + &session->map_len, TRUE); + + if (session->map == NULL) { + if (session->map_len != 0) { + msg_err_session("cannot map %s: %s", file_str, + strerror(errno)); + g_hash_table_unref(query_args); + + return FALSE; + } + } + + /* We need to create a new URL with file attribute removed */ + new_url = rspamd_fstring_new_init(RSPAMD_FSTRING_DATA(msg->url), + u.field_data[UF_QUERY].off); + new_url = rspamd_fstring_append(new_url, "?", 1); + + g_hash_table_iter_init(&it, query_args); + + while (g_hash_table_iter_next(&it, &k, &v)) { + key_tok = k; + tok = v; + + if (!rspamd_ftok_icase_equal(key_tok, &srch)) { + rspamd_printf_fstring(&new_url, "%T=%T&", + key_tok, tok); + } + } + + /* Erase last character (might be either & or ?) */ + rspamd_fstring_erase(new_url, new_url->len - 1, 1); + + rspamd_fstring_free(msg->url); + msg->url = new_url; + session->fname = file_str; + } + + g_hash_table_unref(query_args); + } + } + + return TRUE; +} + +static void +proxy_backend_mirror_error_handler(struct rspamd_http_connection *conn, GError *err) +{ + struct rspamd_proxy_backend_connection *bk_conn = conn->ud; + struct rspamd_proxy_session *session; + + session = bk_conn->s; + msg_info_session("abnormally closing connection from backend: %s:%s, " + "error: %e", + bk_conn->name, + rspamd_inet_address_to_string_pretty( + rspamd_upstream_addr_cur(bk_conn->up)), + err); + + if (err) { + bk_conn->err = rspamd_mempool_strdup(session->pool, err->message); + } + + rspamd_upstream_fail(bk_conn->up, FALSE, err ? err->message : "unknown"); + + proxy_backend_close_connection(bk_conn); + REF_RELEASE(bk_conn->s); +} + +static gint +proxy_backend_mirror_finish_handler(struct rspamd_http_connection *conn, + struct rspamd_http_message *msg) +{ + struct rspamd_proxy_backend_connection *bk_conn = conn->ud; + struct rspamd_proxy_session *session; + const rspamd_ftok_t *orig_ct; + + session = bk_conn->s; + + proxy_request_decompress(msg); + orig_ct = rspamd_http_message_find_header(msg, "Content-Type"); + + if (!proxy_backend_parse_results(session, bk_conn, session->ctx->lua_state, + bk_conn->parser_from_ref, msg, NULL, orig_ct)) { + msg_warn_session("cannot parse results from the mirror backend %s:%s", + bk_conn->name, + rspamd_inet_address_to_string( + rspamd_upstream_addr_cur(bk_conn->up))); + bk_conn->err = "cannot parse ucl"; + } + + msg_info_session("finished mirror connection to %s", bk_conn->name); + rspamd_upstream_ok(bk_conn->up); + + proxy_backend_close_connection(bk_conn); + REF_RELEASE(bk_conn->s); + + return 0; +} + +static void +proxy_open_mirror_connections(struct rspamd_proxy_session *session) +{ + gdouble coin; + struct rspamd_http_mirror *m; + guint i; + struct rspamd_proxy_backend_connection *bk_conn; + struct rspamd_http_message *msg; + GError *err = NULL; + + coin = rspamd_random_double(); + + for (i = 0; i < session->ctx->mirrors->len; i++) { + m = g_ptr_array_index(session->ctx->mirrors, i); + + if (m->prob < coin) { + /* No luck */ + continue; + } + + bk_conn = rspamd_mempool_alloc0(session->pool, + sizeof(*bk_conn)); + bk_conn->s = session; + bk_conn->name = m->name; + bk_conn->timeout = m->timeout; + + bk_conn->up = rspamd_upstream_get(m->u, + RSPAMD_UPSTREAM_ROUND_ROBIN, NULL, 0); + bk_conn->parser_from_ref = m->parser_from_ref; + bk_conn->parser_to_ref = m->parser_to_ref; + + if (bk_conn->up == NULL) { + msg_err_session("cannot select upstream for %s", m->name); + continue; + } + + bk_conn->backend_sock = rspamd_inet_address_connect( + rspamd_upstream_addr_next(bk_conn->up), + SOCK_STREAM, TRUE); + + if (bk_conn->backend_sock == -1) { + msg_err_session("cannot connect upstream for %s", m->name); + rspamd_upstream_fail(bk_conn->up, TRUE, strerror(errno)); + continue; + } + + msg = rspamd_http_connection_copy_msg(session->client_message, &err); + + if (msg == NULL) { + msg_err_session("cannot copy message to send to a mirror %s: %e", + m->name, err); + if (err) { + g_error_free(err); + } + continue; + } + + if (msg->url->len == 0) { + msg->url = rspamd_fstring_append(msg->url, "/check", strlen("/check")); + } + + if (m->settings_id != NULL) { + rspamd_http_message_remove_header(msg, "Settings-ID"); + rspamd_http_message_add_header(msg, "Settings-ID", m->settings_id); + } + + bk_conn->backend_conn = rspamd_http_connection_new_client_socket( + session->ctx->http_ctx, + NULL, + proxy_backend_mirror_error_handler, + proxy_backend_mirror_finish_handler, + RSPAMD_HTTP_CLIENT_SIMPLE, + bk_conn->backend_sock); + + if (m->key) { + msg->peer_key = rspamd_pubkey_ref(m->key); + } + + if (m->local || + rspamd_inet_address_is_local(rspamd_upstream_addr_cur(bk_conn->up))) { + + if (session->fname) { + rspamd_http_message_add_header(msg, "File", session->fname); + } + + msg->method = HTTP_GET; + rspamd_http_connection_write_message_shared(bk_conn->backend_conn, + msg, rspamd_upstream_name(bk_conn->up), NULL, bk_conn, + bk_conn->timeout); + } + else { + if (session->fname) { + msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM; + rspamd_http_message_set_body(msg, session->map, session->map_len); + } + + msg->method = HTTP_POST; + + if (m->compress) { + proxy_request_compress(msg); + + if (session->client_milter_conn) { + rspamd_http_message_add_header(msg, "Content-Type", + "application/octet-stream"); + } + } + else { + if (session->client_milter_conn) { + rspamd_http_message_add_header(msg, "Content-Type", + "text/plain"); + } + } + + rspamd_http_connection_write_message(bk_conn->backend_conn, + msg, rspamd_upstream_name(bk_conn->up), NULL, bk_conn, + bk_conn->timeout); + } + + g_ptr_array_add(session->mirror_conns, bk_conn); + REF_RETAIN(session); + msg_info_session("send request to %s", m->name); + } +} + +static void +proxy_client_write_error(struct rspamd_proxy_session *session, gint code, + const gchar *status) +{ + struct rspamd_http_message *reply; + + if (session->client_milter_conn) { + rspamd_milter_send_action(session->client_milter_conn, + RSPAMD_MILTER_TEMPFAIL); + REF_RELEASE(session); + } + else { + reply = rspamd_http_new_message(HTTP_RESPONSE); + + switch (code) { + case ETIMEDOUT: + reply->code = 504; + reply->status = RSPAMD_FSTRING_LIT("Gateway timeout"); + break; + case ECONNRESET: + case ECONNABORTED: + reply->code = 502; + reply->status = RSPAMD_FSTRING_LIT("Gateway connection reset"); + break; + case ECONNREFUSED: + reply->code = 502; + reply->status = RSPAMD_FSTRING_LIT("Gateway connection refused"); + break; + default: + if (code >= 300) { + /* Likely HTTP error */ + reply->code = code; + reply->status = rspamd_fstring_new_init(status, strlen(status)); + } + else { + reply->code = 502; + reply->status = RSPAMD_FSTRING_LIT("Unknown gateway error: "); + reply->status = rspamd_fstring_append(reply->status, + status, strlen(status)); + } + break; + } + + rspamd_http_connection_write_message(session->client_conn, + reply, NULL, NULL, session, + session->ctx->timeout); + } +} + +static void +proxy_backend_master_error_handler(struct rspamd_http_connection *conn, GError *err) +{ + struct rspamd_proxy_backend_connection *bk_conn = conn->ud; + struct rspamd_proxy_session *session; + + session = bk_conn->s; + session->retries++; + msg_info_session("abnormally closing connection from backend: %s, error: %e," + " retries left: %d", + rspamd_inet_address_to_string_pretty( + rspamd_upstream_addr_cur(session->master_conn->up)), + err, + session->ctx->max_retries - session->retries); + rspamd_upstream_fail(bk_conn->up, FALSE, err ? err->message : "unknown"); + proxy_backend_close_connection(session->master_conn); + + if (session->ctx->max_retries > 0 && + session->retries >= session->ctx->max_retries) { + msg_err_session("cannot connect to upstream, maximum retries " + "has been reached: %d", + session->retries); + /* Terminate session immediately */ + if (err) { + proxy_client_write_error(session, err->code, err->message); + } + else { + proxy_client_write_error(session, 503, "Unknown error after no retries left"); + } + } + else { + if (!proxy_send_master_message(session)) { + if (err) { + proxy_client_write_error(session, err->code, err->message); + } + else { + proxy_client_write_error(session, 503, "Unknown error on write"); + } + } + else { + msg_info_session("retry connection to: %s" + " retries left: %d", + rspamd_inet_address_to_string( + rspamd_upstream_addr_cur(session->master_conn->up)), + session->ctx->max_retries - session->retries); + } + } +} + +static gint +proxy_backend_master_finish_handler(struct rspamd_http_connection *conn, + struct rspamd_http_message *msg) +{ + struct rspamd_proxy_backend_connection *bk_conn = conn->ud; + struct rspamd_proxy_session *session, *nsession; + rspamd_fstring_t *reply; + const rspamd_ftok_t *orig_ct; + goffset body_offset = -1; + + session = bk_conn->s; + rspamd_http_connection_steal_msg(session->master_conn->backend_conn); + proxy_request_decompress(msg); + + /* + * These are likely set by an http library, so we will double these headers + * if they are not removed + */ + rspamd_http_message_remove_header(msg, "Content-Length"); + rspamd_http_message_remove_header(msg, "Connection"); + rspamd_http_message_remove_header(msg, "Date"); + rspamd_http_message_remove_header(msg, "Server"); + rspamd_http_message_remove_header(msg, "Key"); + orig_ct = rspamd_http_message_find_header(msg, "Content-Type"); + rspamd_http_connection_reset(session->master_conn->backend_conn); + + if (!proxy_backend_parse_results(session, bk_conn, session->ctx->lua_state, + bk_conn->parser_from_ref, msg, &body_offset, orig_ct)) { + msg_warn_session("cannot parse results from the master backend"); + } + + + if (session->legacy_support > LEGACY_SUPPORT_NO) { + /* We need to reformat ucl to fit with legacy spamc protocol */ + if (bk_conn->results) { + reply = rspamd_fstring_new(); + + if (session->legacy_support == LEGACY_SUPPORT_SPAMC) { + rspamd_ucl_tospamc_output(bk_conn->results, &reply); + msg->flags |= RSPAMD_HTTP_FLAG_SPAMC; + } + else { + rspamd_ucl_torspamc_output(bk_conn->results, &reply); + } + + rspamd_http_message_set_body_from_fstring_steal(msg, reply); + msg->method = HTTP_SYMBOLS; + } + else { + msg_warn_session("cannot parse results from the master backend, " + "return them as is"); + } + } + + rspamd_upstream_ok(bk_conn->up); + + if (session->client_milter_conn) { + nsession = proxy_session_refresh(session); + + if (body_offset > 0) { + rspamd_milter_send_task_results(nsession->client_milter_conn, + session->master_conn->results, + msg->body_buf.begin + body_offset, + msg->body_buf.len - body_offset); + } + else { + rspamd_milter_send_task_results(nsession->client_milter_conn, + session->master_conn->results, NULL, 0); + } + REF_RELEASE(session); + rspamd_http_message_free(msg); + } + else { + const gchar *passed_ct = NULL; + + if (orig_ct) { + passed_ct = rspamd_mempool_ftokdup(session->pool, orig_ct); + /* Remove original */ + rspamd_http_message_remove_header(msg, "Content-Type"); + } + + rspamd_http_connection_write_message(session->client_conn, + msg, NULL, passed_ct, session, + bk_conn->timeout); + } + + return 0; +} + +static void +rspamd_proxy_scan_self_reply(struct rspamd_task *task) +{ + struct rspamd_http_message *msg; + struct rspamd_proxy_session *session = task->fin_arg, *nsession; + ucl_object_t *rep = NULL; + const char *ctype = "application/json"; + + msg = rspamd_http_new_message(HTTP_RESPONSE); + msg->date = time(NULL); + msg->code = 200; + + switch (task->cmd) { + case CMD_CHECK: + case CMD_SKIP: + case CMD_CHECK_RSPAMC: + case CMD_CHECK_SPAMC: + case CMD_CHECK_V2: + rspamd_task_set_finish_time(task); + rspamd_protocol_http_reply(msg, task, &rep); + rspamd_protocol_write_log_pipe(task); + break; + case CMD_PING: + rspamd_http_message_set_body(msg, "pong" CRLF, 6); + ctype = "text/plain"; + break; + default: + msg_err_task("BROKEN"); + break; + } + + session->master_conn->flags |= RSPAMD_BACKEND_CLOSED; + + if (rep) { + session->master_conn->results = ucl_object_ref(rep); + } + + if (session->client_milter_conn) { + nsession = proxy_session_refresh(session); + + if (task->flags & RSPAMD_TASK_FLAG_MESSAGE_REWRITE) { + const gchar *start; + goffset len, hdr_off; + + start = task->msg.begin; + len = task->msg.len; + + hdr_off = MESSAGE_FIELD(task, raw_headers_content).len; + + if (hdr_off < len) { + start += hdr_off; + len -= hdr_off; + + /* The problem here is that we need not end of headers, we need + * start of body. + * + * Hence, we need to skip one \r\n till there is anything else in + * a line. + */ + + if (*start == '\r' && len > 0) { + start++; + len--; + } + + if (*start == '\n' && len > 0) { + start++; + len--; + } + + rspamd_milter_send_task_results(nsession->client_milter_conn, + session->master_conn->results, start, len); + } + else { + /* XXX: should never happen! */ + rspamd_milter_send_task_results(nsession->client_milter_conn, + session->master_conn->results, NULL, 0); + } + } + else { + rspamd_milter_send_task_results(nsession->client_milter_conn, + session->master_conn->results, NULL, 0); + } + rspamd_http_message_free(msg); + REF_RELEASE(session); + } + else { + rspamd_http_connection_reset(session->client_conn); + rspamd_http_connection_write_message(session->client_conn, + msg, + NULL, + ctype, + session, + session->ctx->timeout / 10.0); + } +} + +static gboolean +rspamd_proxy_task_fin(void *ud) +{ + struct rspamd_task *task = ud; + + msg_debug_task("finish task"); + + if (RSPAMD_TASK_IS_PROCESSED(task)) { + rspamd_proxy_scan_self_reply(task); + return TRUE; + } + + if (!rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL)) { + rspamd_proxy_scan_self_reply(task); + return TRUE; + } + + if (RSPAMD_TASK_IS_PROCESSED(task)) { + rspamd_proxy_scan_self_reply(task); + return TRUE; + } + + /* One more iteration */ + return FALSE; +} + +static gboolean +rspamd_proxy_self_scan(struct rspamd_proxy_session *session) +{ + struct rspamd_task *task; + struct rspamd_http_message *msg; + const gchar *data; + gsize len; + + msg = session->client_message; + task = rspamd_task_new(session->worker, session->ctx->cfg, + session->pool, session->ctx->lang_det, + session->ctx->event_loop, FALSE); + task->flags |= RSPAMD_TASK_FLAG_MIME; + + if (session->ctx->milter) { + task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_MILTER | + RSPAMD_TASK_PROTOCOL_FLAG_BODY_BLOCK; + } + + task->sock = -1; + + if (session->client_milter_conn) { + task->client_addr = rspamd_inet_address_copy( + session->client_milter_conn->addr, NULL); + } + else { + task->client_addr = rspamd_inet_address_copy(session->client_addr, NULL); + } + + task->fin_arg = session; + task->resolver = session->ctx->resolver; + /* TODO: allow to disable autolearn in protocol */ + task->flags |= RSPAMD_TASK_FLAG_LEARN_AUTO; + task->s = rspamd_session_create(task->task_pool, rspamd_proxy_task_fin, + NULL, (event_finalizer_t) rspamd_task_free, task); + data = rspamd_http_message_get_body(msg, &len); + + if (session->backend->settings_id) { + rspamd_http_message_remove_header(msg, "Settings-ID"); + rspamd_http_message_add_header(msg, "Settings-ID", + session->backend->settings_id); + } + + /* Process message */ + if (!rspamd_protocol_handle_request(task, msg)) { + msg_err_task("cannot handle request: %e", task->err); + task->flags |= RSPAMD_TASK_FLAG_SKIP; + } + else { + if (task->cmd == CMD_PING) { + task->flags |= RSPAMD_TASK_FLAG_SKIP; + } + else { + if (!rspamd_task_load_message(task, msg, data, len)) { + msg_err_task("cannot load message: %e", task->err); + task->flags |= RSPAMD_TASK_FLAG_SKIP; + } + } + } + + /* Set global timeout for the task */ + if (session->ctx->default_upstream->timeout > 0.0) { + task->timeout_ev.data = task; + ev_timer_init(&task->timeout_ev, rspamd_task_timeout, + session->ctx->default_upstream->timeout, + session->ctx->default_upstream->timeout); + ev_timer_start(task->event_loop, &task->timeout_ev); + } + else if (session->ctx->has_self_scan) { + if (!isnan(session->ctx->task_timeout) && session->ctx->task_timeout > 0) { + task->timeout_ev.data = task; + ev_timer_init(&task->timeout_ev, rspamd_task_timeout, + session->ctx->cfg->task_timeout, + session->ctx->default_upstream->timeout); + ev_timer_start(task->event_loop, &task->timeout_ev); + } + } + + session->master_conn->task = task; + rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL); + + rspamd_session_pending(task->s); + + return TRUE; +} + +static gboolean +proxy_send_master_message(struct rspamd_proxy_session *session) +{ + struct rspamd_http_message *msg; + struct rspamd_http_upstream *backend = NULL; + const rspamd_ftok_t *host; + GError *err = NULL; + gchar hostbuf[512]; + + host = rspamd_http_message_find_header(session->client_message, "Host"); + + if (host == NULL) { + backend = session->ctx->default_upstream; + } + else { + rspamd_strlcpy(hostbuf, host->begin, MIN(host->len + 1, sizeof(hostbuf))); + backend = g_hash_table_lookup(session->ctx->upstreams, hostbuf); + + if (backend == NULL) { + backend = session->ctx->default_upstream; + } + } + + if (backend == NULL) { + /* No backend */ + msg_err_session("cannot find upstream for %s", host ? hostbuf : "default"); + goto err; + } + else { + session->backend = backend; + + if (backend->self_scan) { + return rspamd_proxy_self_scan(session); + } + retry: + if (session->ctx->max_retries && + session->retries > session->ctx->max_retries) { + msg_err_session("cannot connect to upstream, maximum retries " + "has been reached: %d", + session->retries); + goto err; + } + + /* Provide hash key if hashing based on source address is desired */ + guint hash_len; + gpointer hash_key = rspamd_inet_address_get_hash_key(session->client_addr, + &hash_len); + + if (session->ctx->max_retries > 1 && + session->retries == session->ctx->max_retries) { + + session->master_conn->up = rspamd_upstream_get_except(backend->u, + session->master_conn->up, + RSPAMD_UPSTREAM_ROUND_ROBIN, + hash_key, hash_len); + } + else { + session->master_conn->up = rspamd_upstream_get(backend->u, + RSPAMD_UPSTREAM_ROUND_ROBIN, + hash_key, hash_len); + } + + session->master_conn->timeout = backend->timeout; + + if (session->master_conn->up == NULL) { + msg_err_session("cannot select upstream for %s", + host ? hostbuf : "default"); + goto err; + } + + session->master_conn->backend_sock = rspamd_inet_address_connect( + rspamd_upstream_addr_next(session->master_conn->up), + SOCK_STREAM, TRUE); + + if (session->master_conn->backend_sock == -1) { + msg_err_session("cannot connect upstream: %s(%s)", + host ? hostbuf : "default", + rspamd_inet_address_to_string_pretty( + rspamd_upstream_addr_cur( + session->master_conn->up))); + rspamd_upstream_fail(session->master_conn->up, TRUE, + strerror(errno)); + session->retries++; + goto retry; + } + + msg = rspamd_http_connection_copy_msg(session->client_message, &err); + if (msg == NULL) { + msg_err_session("cannot copy message to send it to the upstream: %e", + err); + + if (err) { + g_error_free(err); + } + + goto err; /* No fallback here */ + } + + session->master_conn->backend_conn = rspamd_http_connection_new_client_socket( + session->ctx->http_ctx, + NULL, + proxy_backend_master_error_handler, + proxy_backend_master_finish_handler, + RSPAMD_HTTP_CLIENT_SIMPLE, + session->master_conn->backend_sock); + session->master_conn->flags &= ~RSPAMD_BACKEND_CLOSED; + session->master_conn->parser_from_ref = backend->parser_from_ref; + session->master_conn->parser_to_ref = backend->parser_to_ref; + + if (backend->key) { + msg->peer_key = rspamd_pubkey_ref(backend->key); + } + + if (backend->settings_id != NULL) { + rspamd_http_message_remove_header(msg, "Settings-ID"); + rspamd_http_message_add_header(msg, "Settings-ID", + backend->settings_id); + } + + if (backend->local || + rspamd_inet_address_is_local( + rspamd_upstream_addr_cur( + session->master_conn->up))) { + + if (session->fname) { + rspamd_http_message_add_header(msg, "File", session->fname); + } + + msg->method = HTTP_GET; + + rspamd_http_connection_write_message_shared( + session->master_conn->backend_conn, + msg, rspamd_upstream_name(session->master_conn->up), + NULL, session->master_conn, + session->master_conn->timeout); + } + else { + if (session->fname) { + msg->flags &= ~RSPAMD_HTTP_FLAG_SHMEM; + rspamd_http_message_set_body(msg, + session->map, session->map_len); + } + + msg->method = HTTP_POST; + + if (backend->compress) { + proxy_request_compress(msg); + if (session->client_milter_conn) { + rspamd_http_message_add_header(msg, "Content-Type", + "application/octet-stream"); + } + } + else { + if (session->client_milter_conn) { + rspamd_http_message_add_header(msg, "Content-Type", + "text/plain"); + } + } + + rspamd_http_connection_write_message( + session->master_conn->backend_conn, + msg, rspamd_upstream_name(session->master_conn->up), + NULL, session->master_conn, + session->master_conn->timeout); + } + } + + return TRUE; + +err: + if (session->client_milter_conn) { + rspamd_milter_send_action(session->client_milter_conn, + RSPAMD_MILTER_TEMPFAIL); + REF_RELEASE(session); + } + else { + rspamd_http_connection_steal_msg(session->client_conn); + rspamd_http_connection_reset(session->client_conn); + proxy_client_write_error(session, 404, "Backend not found"); + } + + return FALSE; +} + +static void +proxy_client_error_handler(struct rspamd_http_connection *conn, GError *err) +{ + struct rspamd_proxy_session *session = conn->ud; + + msg_info_session("abnormally closing connection from: %s, error: %s", + rspamd_inet_address_to_string(session->client_addr), err->message); + /* Terminate session immediately */ + proxy_backend_close_connection(session->master_conn); + REF_RELEASE(session); +} + +static gint +proxy_client_finish_handler(struct rspamd_http_connection *conn, + struct rspamd_http_message *msg) +{ + struct rspamd_proxy_session *session = conn->ud; + + if (!session->master_conn) { + session->master_conn = rspamd_mempool_alloc0(session->pool, + sizeof(*session->master_conn)); + session->master_conn->s = session; + session->master_conn->name = "master"; + + /* Reset spamc legacy */ + if (msg->method >= HTTP_SYMBOLS) { + msg->method = HTTP_POST; + + if (msg->flags & RSPAMD_HTTP_FLAG_SPAMC) { + session->legacy_support = LEGACY_SUPPORT_SPAMC; + msg_info_session("enabling legacy spamc mode for session"); + } + else { + session->legacy_support = LEGACY_SUPPORT_RSPAMC; + msg_info_session("enabling legacy rspamc mode for session"); + } + } + + if (msg->url->len == 0) { + msg->url = rspamd_fstring_append(msg->url, + "/" MSG_CMD_CHECK_V2, strlen("/" MSG_CMD_CHECK_V2)); + } + + if (!proxy_check_file(msg, session)) { + goto err; + } + + session->client_message = rspamd_http_connection_steal_msg( + session->client_conn); + session->shmem_ref = rspamd_http_message_shmem_ref(session->client_message); + rspamd_http_message_remove_header(msg, "Content-Length"); + rspamd_http_message_remove_header(msg, "Transfer-Encoding"); + rspamd_http_message_remove_header(msg, "Keep-Alive"); + rspamd_http_message_remove_header(msg, "Connection"); + rspamd_http_message_remove_header(msg, "Key"); + + proxy_open_mirror_connections(session); + rspamd_http_connection_reset(session->client_conn); + + proxy_send_master_message(session); + } + else { + msg_info_session("finished master connection"); + proxy_backend_close_connection(session->master_conn); + REF_RELEASE(session); + } + + return 0; + +err: + rspamd_http_connection_steal_msg(session->client_conn); + rspamd_http_message_remove_header(msg, "Content-Length"); + rspamd_http_message_remove_header(msg, "Key"); + rspamd_http_message_remove_header(msg, "Transfer-Encoding"); + rspamd_http_message_remove_header(msg, "Keep-Alive"); + rspamd_http_message_remove_header(msg, "Connection"); + rspamd_http_connection_reset(session->client_conn); + proxy_client_write_error(session, 404, "Backend not found"); + + return 0; +} + +static void +proxy_milter_finish_handler(gint fd, + struct rspamd_milter_session *rms, + void *ud) +{ + struct rspamd_proxy_session *session = ud; + struct rspamd_http_message *msg; + + session->client_milter_conn = rms; + + if (rms->message == NULL || rms->message->len == 0) { + msg_info_session("finished milter connection"); + proxy_backend_close_connection(session->master_conn); + REF_RELEASE(session); + } + else { + if (!session->master_conn) { + session->master_conn = rspamd_mempool_alloc0(session->pool, + sizeof(*session->master_conn)); + } + + msg = rspamd_milter_to_http(rms); + session->master_conn->s = session; + session->master_conn->name = "master"; + session->client_message = msg; + + proxy_open_mirror_connections(session); + proxy_send_master_message(session); + } +} + +static void +proxy_milter_error_handler(gint fd, + struct rspamd_milter_session *rms, /* unused */ + void *ud, GError *err) +{ + struct rspamd_proxy_session *session = ud; + + if (err && err->code != 0) { + msg_info_session("abnormally closing milter connection from: %s, " + "error: %e", + rspamd_inet_address_to_string_pretty(session->client_addr), + err); + /* Terminate session immediately */ + proxy_backend_close_connection(session->master_conn); + REF_RELEASE(session); + } + else { + msg_info_session("normally closing milter connection from: %s, " + "%e", + rspamd_inet_address_to_string_pretty(session->client_addr), + err); + /* Terminate session immediately */ + proxy_backend_close_connection(session->master_conn); + REF_RELEASE(session); + } +} + +static void +proxy_accept_socket(EV_P_ ev_io *w, int revents) +{ + struct rspamd_worker *worker = (struct rspamd_worker *) w->data; + struct rspamd_proxy_ctx *ctx; + rspamd_inet_addr_t *addr = NULL; + struct rspamd_proxy_session *session; + gint nfd; + + ctx = worker->ctx; + + if ((nfd = + rspamd_accept_from_socket(w->fd, &addr, + rspamd_worker_throttle_accept_events, worker->accept_events)) == -1) { + msg_warn("accept failed: %s", strerror(errno)); + return; + } + /* Check for EAGAIN */ + if (nfd == 0) { + rspamd_inet_address_free(addr); + return; + } + + session = g_malloc0(sizeof(*session)); + REF_INIT_RETAIN(session, proxy_session_dtor); + session->client_sock = nfd; + session->client_addr = addr; + session->mirror_conns = g_ptr_array_sized_new(ctx->mirrors->len); + + session->pool = rspamd_mempool_new(rspamd_mempool_suggest_size(), + "proxy", 0); + session->ctx = ctx; + session->worker = worker; + + if (ctx->sessions_cache) { + rspamd_worker_session_cache_add(ctx->sessions_cache, + session->pool->tag.uid, &session->ref.refcount, session); + } + + if (!ctx->milter) { + int http_opts = 0; + + if (ctx->encrypted_only && !rspamd_inet_address_is_local(addr)) { + http_opts |= RSPAMD_HTTP_REQUIRE_ENCRYPTION; + } + session->client_conn = rspamd_http_connection_new_server( + ctx->http_ctx, + nfd, + NULL, + proxy_client_error_handler, + proxy_client_finish_handler, + http_opts); + + if (ctx->key) { + rspamd_http_connection_set_key(session->client_conn, ctx->key); + } + + msg_info_session("accepted http connection from %s port %d", + rspamd_inet_address_to_string(addr), + rspamd_inet_address_get_port(addr)); + + rspamd_http_connection_read_message_shared(session->client_conn, + session, + session->ctx->timeout); + } + else { + msg_info_session("accepted milter connection from %s port %d", + rspamd_inet_address_to_string(addr), + rspamd_inet_address_get_port(addr)); + +#ifdef TCP_NODELAY + +#ifndef SOL_TCP +#define SOL_TCP IPPROTO_TCP +#endif + + if (rspamd_inet_address_get_af(addr) != AF_UNIX) { + gint sopt = 1; + + if (setsockopt(nfd, SOL_TCP, TCP_NODELAY, &sopt, sizeof(sopt)) == + -1) { + msg_warn_session("cannot set TCP_NODELAY: %s", + strerror(errno)); + } + } +#endif + + rspamd_milter_handle_socket(nfd, 0.0, + session->pool, + ctx->event_loop, + proxy_milter_finish_handler, + proxy_milter_error_handler, + session); + } +} + +static void +adjust_upstreams_limits(struct rspamd_proxy_ctx *ctx) +{ + struct rspamd_http_upstream *backend; + gpointer k, v; + GHashTableIter it; + + /* + * We set error time equal to max_retries * backend_timeout and max_errors + * to max_retries - 1 + * + * So if we failed to scan a message on a backend for some reasons, we + * will try to re-resolve it faster + */ + + g_hash_table_iter_init(&it, ctx->upstreams); + + while (g_hash_table_iter_next(&it, &k, &v)) { + backend = (struct rspamd_http_upstream *) v; + + if (!backend->self_scan && backend->u) { + rspamd_upstreams_set_limits(backend->u, + NAN, NAN, ctx->max_retries * backend->timeout, NAN, + ctx->max_retries - 1, 0); + } + } +} + +__attribute__((noreturn)) void +start_rspamd_proxy(struct rspamd_worker *worker) +{ + struct rspamd_proxy_ctx *ctx = worker->ctx; + gboolean is_controller = FALSE; + + g_assert(rspamd_worker_check_context(worker->ctx, rspamd_rspamd_proxy_magic)); + ctx->cfg = worker->srv->cfg; + ctx->event_loop = rspamd_prepare_worker(worker, "rspamd_proxy", + proxy_accept_socket); + + ctx->resolver = rspamd_dns_resolver_init(worker->srv->logger, + ctx->event_loop, + worker->srv->cfg); + + rspamd_upstreams_library_config(worker->srv->cfg, ctx->cfg->ups_ctx, + ctx->event_loop, ctx->resolver->r); + + ctx->http_ctx = rspamd_http_context_create(ctx->cfg, ctx->event_loop, + ctx->cfg->ups_ctx); + rspamd_mempool_add_destructor(ctx->cfg->cfg_pool, + (rspamd_mempool_destruct_t) rspamd_http_context_free, + ctx->http_ctx); + + if (ctx->has_self_scan) { + /* Additional initialisation needed */ + rspamd_worker_init_scanner(worker, ctx->event_loop, ctx->resolver, + &ctx->lang_det); + ctx->task_timeout = rspamd_worker_check_and_adjust_timeout(ctx->cfg, NAN); + + is_controller = rspamd_worker_check_controller_presence(worker); + } + else { + worker->flags &= ~RSPAMD_WORKER_SCANNER; + } + + if (worker->srv->cfg->enable_sessions_cache) { + ctx->sessions_cache = rspamd_worker_session_cache_new(worker, + ctx->event_loop); + } + + ctx->milter_ctx.spam_header = ctx->spam_header; + ctx->milter_ctx.discard_on_reject = ctx->discard_on_reject; + ctx->milter_ctx.quarantine_on_reject = ctx->quarantine_on_reject; + ctx->milter_ctx.sessions_cache = ctx->sessions_cache; + ctx->milter_ctx.client_ca_name = ctx->client_ca_name; + ctx->milter_ctx.reject_message = ctx->reject_message; + ctx->milter_ctx.cfg = ctx->cfg; + rspamd_milter_init_library(&ctx->milter_ctx); + + if (is_controller) { + rspamd_worker_init_controller(worker, NULL); + } + else { + if (ctx->has_self_scan) { + rspamd_map_watch(worker->srv->cfg, ctx->event_loop, ctx->resolver, + worker, RSPAMD_MAP_WATCH_SCANNER); + } + else { + rspamd_map_watch(worker->srv->cfg, ctx->event_loop, ctx->resolver, + worker, RSPAMD_MAP_WATCH_WORKER); + } + } + + rspamd_lua_run_postloads(ctx->cfg->lua_state, ctx->cfg, ctx->event_loop, + worker); + adjust_upstreams_limits(ctx); + + ev_loop(ctx->event_loop, 0); + rspamd_worker_block_signals(); + + if (ctx->has_self_scan) { + rspamd_stat_close(); + } + + if (is_controller) { + rspamd_controller_on_terminate(worker, NULL); + } + + REF_RELEASE(ctx->cfg); + rspamd_log_close(worker->srv->logger); + rspamd_unset_crash_handler(worker->srv); + + exit(EXIT_SUCCESS); +} |