mirror of https://github.com/rspamd/rspamd.git
Rapid spam filtering system
https://rspamd.com/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
300 lines
7.5 KiB
300 lines
7.5 KiB
/*-
|
|
* Copyright 2016 Vsevolod Stakhov
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
#include "config.h"
|
|
#include "rspamd.h"
|
|
#include "util.h"
|
|
#include "libutil/fstring.h"
|
|
#include "libutil/http.h"
|
|
#include "libutil/http_private.h"
|
|
#include "ottery.h"
|
|
#include "cryptobox.h"
|
|
#include "keypair.h"
|
|
#include "unix-std.h"
|
|
#include <math.h>
|
|
|
|
#ifdef HAVE_SYS_WAIT_H
|
|
#include <sys/wait.h>
|
|
#endif
|
|
|
|
static unsigned int port = 43000;
|
|
static unsigned int cache_size = 10;
|
|
static unsigned int nworkers = 1;
|
|
static gboolean openssl_mode = FALSE;
|
|
static GHashTable *maps = NULL;
|
|
static char *key = NULL;
|
|
static struct rspamd_keypair_cache *c;
|
|
static struct rspamd_cryptobox_keypair *server_key;
|
|
static struct timeval io_tv = {
|
|
.tv_sec = 20,
|
|
.tv_usec = 0};
|
|
|
|
static GOptionEntry entries[] = {
|
|
{"port", 'p', 0, G_OPTION_ARG_INT, &port,
|
|
"Port number (default: 43000)", NULL},
|
|
{"cache", 'c', 0, G_OPTION_ARG_INT, &cache_size,
|
|
"Keys cache size (default: 10)", NULL},
|
|
{"workers", 'n', 0, G_OPTION_ARG_INT, &nworkers,
|
|
"Number of workers to start (default: 1)", NULL},
|
|
{"openssl", 'o', 0, G_OPTION_ARG_NONE, &openssl_mode,
|
|
"Use openssl crypto", NULL},
|
|
{"key", 'k', 0, G_OPTION_ARG_STRING, &key,
|
|
"Use static keypair instead of new one (base32 encoded sk || pk)", NULL},
|
|
{NULL, 0, 0, G_OPTION_ARG_NONE, NULL, NULL, NULL}};
|
|
|
|
struct rspamd_http_server_session {
|
|
struct rspamd_http_connection *conn;
|
|
struct ev_loop *ev_base;
|
|
unsigned int req_size;
|
|
gboolean reply;
|
|
int fd;
|
|
};
|
|
|
|
static void
|
|
rspamd_server_error(struct rspamd_http_connection *conn,
|
|
GError *err)
|
|
{
|
|
struct rspamd_http_server_session *session = conn->ud;
|
|
|
|
rspamd_fprintf(stderr, "http error occurred: %s\n", err->message);
|
|
rspamd_http_connection_unref(conn);
|
|
close(session->fd);
|
|
g_slice_free1(sizeof(*session), session);
|
|
}
|
|
|
|
static int
|
|
rspamd_server_finish(struct rspamd_http_connection *conn,
|
|
struct rspamd_http_message *msg)
|
|
{
|
|
struct rspamd_http_server_session *session = conn->ud;
|
|
struct rspamd_http_message *reply;
|
|
gulong size;
|
|
const char *url_str;
|
|
unsigned int url_len;
|
|
rspamd_fstring_t *body;
|
|
|
|
if (!session->reply) {
|
|
session->reply = TRUE;
|
|
reply = rspamd_http_new_message(HTTP_RESPONSE);
|
|
url_str = msg->url->str;
|
|
url_len = msg->url->len;
|
|
|
|
if (url_str[0] == '/') {
|
|
url_str++;
|
|
url_len--;
|
|
}
|
|
|
|
if (rspamd_strtoul(url_str, url_len, &size)) {
|
|
session->req_size = size;
|
|
|
|
reply->code = 200;
|
|
reply->status = rspamd_fstring_new_init("OK", 2);
|
|
body = rspamd_fstring_sized_new(size);
|
|
body->len = size;
|
|
memset(body->str, 0, size);
|
|
rspamd_http_message_set_body_from_fstring_steal(msg, body);
|
|
}
|
|
else {
|
|
reply->code = 404;
|
|
reply->status = rspamd_fstring_new_init("Not found", 9);
|
|
}
|
|
|
|
rspamd_http_connection_reset(conn);
|
|
rspamd_http_connection_write_message(conn, reply, NULL,
|
|
"application/octet-stream", session, session->fd,
|
|
&io_tv, session->ev_base);
|
|
}
|
|
else {
|
|
/* Destroy session */
|
|
rspamd_http_connection_unref(conn);
|
|
close(session->fd);
|
|
g_slice_free1(sizeof(*session), session);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
rspamd_server_accept(int fd, short what, void *arg)
|
|
{
|
|
struct ev_loop *ev_base = arg;
|
|
struct rspamd_http_server_session *session;
|
|
rspamd_inet_addr_t *addr;
|
|
int nfd;
|
|
|
|
do {
|
|
if ((nfd =
|
|
rspamd_accept_from_socket(fd, &addr, NULL)) == -1) {
|
|
rspamd_fprintf(stderr, "accept failed: %s", strerror(errno));
|
|
return;
|
|
}
|
|
/* Check for EAGAIN */
|
|
if (nfd == 0) {
|
|
rspamd_inet_address_free(addr);
|
|
return;
|
|
}
|
|
|
|
rspamd_inet_address_free(addr);
|
|
session = g_slice_alloc(sizeof(*session));
|
|
session->conn = rspamd_http_connection_new(NULL,
|
|
rspamd_server_error,
|
|
rspamd_server_finish,
|
|
0,
|
|
RSPAMD_HTTP_SERVER,
|
|
c,
|
|
NULL);
|
|
rspamd_http_connection_set_key(session->conn, server_key);
|
|
rspamd_http_connection_read_message(session->conn,
|
|
session,
|
|
nfd,
|
|
&io_tv,
|
|
ev_base);
|
|
session->reply = FALSE;
|
|
session->fd = nfd;
|
|
session->ev_base = ev_base;
|
|
} while (nfd > 0);
|
|
}
|
|
|
|
static void
|
|
rspamd_http_term_handler(int fd, short what, void *arg)
|
|
{
|
|
struct ev_loop *ev_base = arg;
|
|
struct timeval tv = {0, 0};
|
|
|
|
event_base_loopexit(ev_base, &tv);
|
|
}
|
|
|
|
static void
|
|
rspamd_http_server_func(int fd, rspamd_inet_addr_t *addr)
|
|
{
|
|
struct ev_loop *ev_base = event_init();
|
|
struct event accept_ev, term_ev;
|
|
|
|
event_set(&accept_ev, fd, EV_READ | EV_PERSIST, rspamd_server_accept, ev_base);
|
|
event_base_set(ev_base, &accept_ev);
|
|
event_add(&accept_ev, NULL);
|
|
|
|
evsignal_set(&term_ev, SIGTERM, rspamd_http_term_handler, ev_base);
|
|
event_base_set(ev_base, &term_ev);
|
|
event_add(&term_ev, NULL);
|
|
|
|
event_base_loop(ev_base, 0);
|
|
}
|
|
|
|
static void
|
|
rspamd_http_start_servers(pid_t *sfd, rspamd_inet_addr_t *addr)
|
|
{
|
|
unsigned int i;
|
|
int fd;
|
|
|
|
fd = rspamd_inet_address_listen(addr, SOCK_STREAM, TRUE);
|
|
g_assert(fd != -1);
|
|
|
|
for (i = 0; i < nworkers; i++) {
|
|
sfd[i] = fork();
|
|
g_assert(sfd[i] != -1);
|
|
|
|
if (sfd[i] == 0) {
|
|
rspamd_http_server_func(fd, addr);
|
|
exit(EXIT_SUCCESS);
|
|
}
|
|
}
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void
|
|
rspamd_http_stop_servers(pid_t *sfd)
|
|
{
|
|
unsigned int i;
|
|
int res;
|
|
|
|
for (i = 0; i < nworkers; i++) {
|
|
kill(sfd[i], SIGTERM);
|
|
wait(&res);
|
|
}
|
|
}
|
|
|
|
static void
|
|
rspamd_http_server_term(int fd, short what, void *arg)
|
|
{
|
|
pid_t *sfd = arg;
|
|
|
|
rspamd_http_stop_servers(sfd);
|
|
event_loopexit(NULL);
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
GOptionContext *context;
|
|
GError *error = NULL;
|
|
struct ev_loop *ev_base;
|
|
GString *b32_key;
|
|
pid_t *sfd;
|
|
rspamd_inet_addr_t *addr;
|
|
struct event term_ev, int_ev;
|
|
struct in_addr ina = {INADDR_ANY};
|
|
|
|
rspamd_init_libs();
|
|
|
|
context = g_option_context_new(
|
|
"rspamd-http-server - test server for benchmarks");
|
|
g_option_context_set_summary(context,
|
|
"Summary:\n Rspamd test HTTP server " RVERSION
|
|
"\n Release id: " RID);
|
|
g_option_context_add_main_entries(context, entries, NULL);
|
|
|
|
if (!g_option_context_parse(context, &argc, &argv, &error)) {
|
|
rspamd_fprintf(stderr, "option parsing failed: %s\n", error->message);
|
|
g_error_free(error);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
maps = g_hash_table_new(g_int_hash, g_int_equal);
|
|
|
|
if (key == NULL) {
|
|
server_key = rspamd_keypair_new(RSPAMD_KEYPAIR_KEX,
|
|
openssl_mode ? RSPAMD_CRYPTOBOX_MODE_NIST : RSPAMD_CRYPTOBOX_MODE_25519);
|
|
b32_key = rspamd_keypair_print(server_key,
|
|
RSPAMD_KEYPAIR_PUBKEY | RSPAMD_KEYPAIR_BASE32);
|
|
rspamd_printf("key: %v\n", b32_key);
|
|
}
|
|
else {
|
|
/* TODO: add key loading */
|
|
}
|
|
|
|
if (cache_size > 0) {
|
|
c = rspamd_keypair_cache_new(cache_size);
|
|
}
|
|
|
|
sfd = g_alloca(sizeof(*sfd) * nworkers);
|
|
addr = rspamd_inet_address_new(AF_INET, &ina);
|
|
rspamd_inet_address_set_port(addr, port);
|
|
rspamd_http_start_servers(sfd, addr);
|
|
|
|
/* Just wait for workers */
|
|
ev_base = event_init();
|
|
|
|
event_set(&term_ev, SIGTERM, EV_SIGNAL, rspamd_http_server_term, sfd);
|
|
event_base_set(ev_base, &term_ev);
|
|
event_add(&term_ev, NULL);
|
|
event_set(&int_ev, SIGINT, EV_SIGNAL, rspamd_http_server_term, sfd);
|
|
event_base_set(ev_base, &int_ev);
|
|
event_add(&int_ev, NULL);
|
|
|
|
event_base_loop(ev_base, 0);
|
|
|
|
return 0;
|
|
}
|