mirror of
https://source.quilibrium.com/quilibrium/ceremonyclient.git
synced 2024-12-26 08:35:17 +00:00
945 lines
21 KiB
Go
945 lines
21 KiB
Go
package rcmgr
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/netip"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/libp2p/go-libp2p/core/network"
|
|
"github.com/libp2p/go-libp2p/core/peer"
|
|
"github.com/libp2p/go-libp2p/core/protocol"
|
|
|
|
logging "github.com/ipfs/go-log/v2"
|
|
"github.com/multiformats/go-multiaddr"
|
|
manet "github.com/multiformats/go-multiaddr/net"
|
|
)
|
|
|
|
var log = logging.Logger("rcmgr")
|
|
|
|
type resourceManager struct {
|
|
limits Limiter
|
|
|
|
connLimiter *connLimiter
|
|
|
|
trace *trace
|
|
metrics *metrics
|
|
disableMetrics bool
|
|
|
|
allowlist *Allowlist
|
|
|
|
system *systemScope
|
|
transient *transientScope
|
|
|
|
allowlistedSystem *systemScope
|
|
allowlistedTransient *transientScope
|
|
|
|
cancelCtx context.Context
|
|
cancel func()
|
|
wg sync.WaitGroup
|
|
|
|
mx sync.Mutex
|
|
svc map[string]*serviceScope
|
|
proto map[protocol.ID]*protocolScope
|
|
peer map[peer.ID]*peerScope
|
|
|
|
stickyProto map[protocol.ID]struct{}
|
|
stickyPeer map[peer.ID]struct{}
|
|
|
|
connId, streamId int64
|
|
}
|
|
|
|
var _ network.ResourceManager = (*resourceManager)(nil)
|
|
|
|
type systemScope struct {
|
|
*resourceScope
|
|
}
|
|
|
|
var _ network.ResourceScope = (*systemScope)(nil)
|
|
|
|
type transientScope struct {
|
|
*resourceScope
|
|
|
|
system *systemScope
|
|
}
|
|
|
|
var _ network.ResourceScope = (*transientScope)(nil)
|
|
|
|
type serviceScope struct {
|
|
*resourceScope
|
|
|
|
service string
|
|
rcmgr *resourceManager
|
|
|
|
peers map[peer.ID]*resourceScope
|
|
}
|
|
|
|
var _ network.ServiceScope = (*serviceScope)(nil)
|
|
|
|
type protocolScope struct {
|
|
*resourceScope
|
|
|
|
proto protocol.ID
|
|
rcmgr *resourceManager
|
|
|
|
peers map[peer.ID]*resourceScope
|
|
}
|
|
|
|
var _ network.ProtocolScope = (*protocolScope)(nil)
|
|
|
|
type peerScope struct {
|
|
*resourceScope
|
|
|
|
peer peer.ID
|
|
rcmgr *resourceManager
|
|
}
|
|
|
|
var _ network.PeerScope = (*peerScope)(nil)
|
|
|
|
type connectionScope struct {
|
|
*resourceScope
|
|
|
|
dir network.Direction
|
|
usefd bool
|
|
isAllowlisted bool
|
|
rcmgr *resourceManager
|
|
peer *peerScope
|
|
endpoint multiaddr.Multiaddr
|
|
ip netip.Addr
|
|
}
|
|
|
|
var _ network.ConnScope = (*connectionScope)(nil)
|
|
var _ network.ConnManagementScope = (*connectionScope)(nil)
|
|
|
|
type streamScope struct {
|
|
*resourceScope
|
|
|
|
dir network.Direction
|
|
rcmgr *resourceManager
|
|
peer *peerScope
|
|
svc *serviceScope
|
|
proto *protocolScope
|
|
|
|
peerProtoScope *resourceScope
|
|
peerSvcScope *resourceScope
|
|
}
|
|
|
|
var _ network.StreamScope = (*streamScope)(nil)
|
|
var _ network.StreamManagementScope = (*streamScope)(nil)
|
|
|
|
type Option func(*resourceManager) error
|
|
|
|
func NewResourceManager(limits Limiter, opts ...Option) (network.ResourceManager, error) {
|
|
allowlist := newAllowlist()
|
|
r := &resourceManager{
|
|
limits: limits,
|
|
connLimiter: newConnLimiter(),
|
|
allowlist: &allowlist,
|
|
svc: make(map[string]*serviceScope),
|
|
proto: make(map[protocol.ID]*protocolScope),
|
|
peer: make(map[peer.ID]*peerScope),
|
|
}
|
|
|
|
for _, opt := range opts {
|
|
if err := opt(r); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
registeredConnLimiterPrefixes := make(map[string]struct{})
|
|
for _, npLimit := range r.connLimiter.networkPrefixLimitV4 {
|
|
registeredConnLimiterPrefixes[npLimit.Network.String()] = struct{}{}
|
|
}
|
|
for _, npLimit := range r.connLimiter.networkPrefixLimitV6 {
|
|
registeredConnLimiterPrefixes[npLimit.Network.String()] = struct{}{}
|
|
}
|
|
for _, network := range allowlist.allowedNetworks {
|
|
prefix, err := netip.ParsePrefix(network.String())
|
|
if err != nil {
|
|
log.Debugf("failed to parse prefix from allowlist %s, %s", network, err)
|
|
continue
|
|
}
|
|
if _, ok := registeredConnLimiterPrefixes[prefix.String()]; !ok {
|
|
// connlimiter doesn't know about this network. Let's fix that
|
|
r.connLimiter.addNetworkPrefixLimit(prefix.Addr().Is6(), NetworkPrefixLimit{
|
|
Network: prefix,
|
|
ConnCount: r.limits.GetAllowlistedSystemLimits().GetConnTotalLimit(),
|
|
})
|
|
}
|
|
}
|
|
|
|
if !r.disableMetrics {
|
|
var sr TraceReporter
|
|
sr, err := NewStatsTraceReporter()
|
|
if err != nil {
|
|
log.Errorf("failed to initialise StatsTraceReporter %s", err)
|
|
} else {
|
|
if r.trace == nil {
|
|
r.trace = &trace{}
|
|
}
|
|
found := false
|
|
for _, rep := range r.trace.reporters {
|
|
if rep == sr {
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
if !found {
|
|
r.trace.reporters = append(r.trace.reporters, sr)
|
|
}
|
|
}
|
|
}
|
|
|
|
if err := r.trace.Start(limits); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
r.system = newSystemScope(limits.GetSystemLimits(), r, "system")
|
|
r.system.IncRef()
|
|
r.transient = newTransientScope(limits.GetTransientLimits(), r, "transient", r.system.resourceScope)
|
|
r.transient.IncRef()
|
|
|
|
r.allowlistedSystem = newSystemScope(limits.GetAllowlistedSystemLimits(), r, "allowlistedSystem")
|
|
r.allowlistedSystem.IncRef()
|
|
r.allowlistedTransient = newTransientScope(limits.GetAllowlistedTransientLimits(), r, "allowlistedTransient", r.allowlistedSystem.resourceScope)
|
|
r.allowlistedTransient.IncRef()
|
|
|
|
r.cancelCtx, r.cancel = context.WithCancel(context.Background())
|
|
|
|
r.wg.Add(1)
|
|
go r.background()
|
|
|
|
return r, nil
|
|
}
|
|
|
|
func (r *resourceManager) GetAllowlist() *Allowlist {
|
|
return r.allowlist
|
|
}
|
|
|
|
// GetAllowlist tries to get the allowlist from the given resourcemanager
|
|
// interface by checking to see if its concrete type is a resourceManager.
|
|
// Returns nil if it fails to get the allowlist.
|
|
func GetAllowlist(rcmgr network.ResourceManager) *Allowlist {
|
|
r, ok := rcmgr.(*resourceManager)
|
|
if !ok {
|
|
return nil
|
|
}
|
|
|
|
return r.allowlist
|
|
}
|
|
|
|
func (r *resourceManager) ViewSystem(f func(network.ResourceScope) error) error {
|
|
return f(r.system)
|
|
}
|
|
|
|
func (r *resourceManager) ViewTransient(f func(network.ResourceScope) error) error {
|
|
return f(r.transient)
|
|
}
|
|
|
|
func (r *resourceManager) ViewService(srv string, f func(network.ServiceScope) error) error {
|
|
s := r.getServiceScope(srv)
|
|
defer s.DecRef()
|
|
|
|
return f(s)
|
|
}
|
|
|
|
func (r *resourceManager) ViewProtocol(proto protocol.ID, f func(network.ProtocolScope) error) error {
|
|
s := r.getProtocolScope(proto)
|
|
defer s.DecRef()
|
|
|
|
return f(s)
|
|
}
|
|
|
|
func (r *resourceManager) ViewPeer(p peer.ID, f func(network.PeerScope) error) error {
|
|
s := r.getPeerScope(p)
|
|
defer s.DecRef()
|
|
|
|
return f(s)
|
|
}
|
|
|
|
func (r *resourceManager) getServiceScope(svc string) *serviceScope {
|
|
r.mx.Lock()
|
|
defer r.mx.Unlock()
|
|
|
|
s, ok := r.svc[svc]
|
|
if !ok {
|
|
s = newServiceScope(svc, r.limits.GetServiceLimits(svc), r)
|
|
r.svc[svc] = s
|
|
}
|
|
|
|
s.IncRef()
|
|
return s
|
|
}
|
|
|
|
func (r *resourceManager) getProtocolScope(proto protocol.ID) *protocolScope {
|
|
r.mx.Lock()
|
|
defer r.mx.Unlock()
|
|
|
|
s, ok := r.proto[proto]
|
|
if !ok {
|
|
s = newProtocolScope(proto, r.limits.GetProtocolLimits(proto), r)
|
|
r.proto[proto] = s
|
|
}
|
|
|
|
s.IncRef()
|
|
return s
|
|
}
|
|
|
|
func (r *resourceManager) setStickyProtocol(proto protocol.ID) {
|
|
r.mx.Lock()
|
|
defer r.mx.Unlock()
|
|
|
|
if r.stickyProto == nil {
|
|
r.stickyProto = make(map[protocol.ID]struct{})
|
|
}
|
|
r.stickyProto[proto] = struct{}{}
|
|
}
|
|
|
|
func (r *resourceManager) getPeerScope(p peer.ID) *peerScope {
|
|
r.mx.Lock()
|
|
defer r.mx.Unlock()
|
|
|
|
s, ok := r.peer[p]
|
|
if !ok {
|
|
s = newPeerScope(p, r.limits.GetPeerLimits(p), r)
|
|
r.peer[p] = s
|
|
}
|
|
|
|
s.IncRef()
|
|
return s
|
|
}
|
|
|
|
func (r *resourceManager) setStickyPeer(p peer.ID) {
|
|
r.mx.Lock()
|
|
defer r.mx.Unlock()
|
|
|
|
if r.stickyPeer == nil {
|
|
r.stickyPeer = make(map[peer.ID]struct{})
|
|
}
|
|
|
|
r.stickyPeer[p] = struct{}{}
|
|
}
|
|
|
|
func (r *resourceManager) nextConnId() int64 {
|
|
r.mx.Lock()
|
|
defer r.mx.Unlock()
|
|
|
|
r.connId++
|
|
return r.connId
|
|
}
|
|
|
|
func (r *resourceManager) nextStreamId() int64 {
|
|
r.mx.Lock()
|
|
defer r.mx.Unlock()
|
|
|
|
r.streamId++
|
|
return r.streamId
|
|
}
|
|
|
|
// OpenConnectionNoIP is deprecated and will be removed in the next release
|
|
func (r *resourceManager) OpenConnectionNoIP(dir network.Direction, usefd bool, endpoint multiaddr.Multiaddr) (network.ConnManagementScope, error) {
|
|
return r.openConnection(dir, usefd, endpoint, netip.Addr{})
|
|
}
|
|
|
|
func (r *resourceManager) OpenConnection(dir network.Direction, usefd bool, endpoint multiaddr.Multiaddr) (network.ConnManagementScope, error) {
|
|
ip, err := manet.ToIP(endpoint)
|
|
if err != nil {
|
|
// No IP address
|
|
return r.openConnection(dir, usefd, endpoint, netip.Addr{})
|
|
}
|
|
|
|
ipAddr, ok := netip.AddrFromSlice(ip)
|
|
if !ok {
|
|
return nil, fmt.Errorf("failed to convert ip to netip.Addr")
|
|
}
|
|
return r.openConnection(dir, usefd, endpoint, ipAddr)
|
|
}
|
|
|
|
func (r *resourceManager) openConnection(dir network.Direction, usefd bool, endpoint multiaddr.Multiaddr, ip netip.Addr) (network.ConnManagementScope, error) {
|
|
if ip.IsValid() {
|
|
if ok := r.connLimiter.addConn(ip); !ok {
|
|
return nil, fmt.Errorf("connections per ip limit exceeded for %s", endpoint)
|
|
}
|
|
}
|
|
|
|
var conn *connectionScope
|
|
conn = newConnectionScope(dir, usefd, r.limits.GetConnLimits(), r, endpoint, ip)
|
|
|
|
err := conn.AddConn(dir, usefd)
|
|
if err != nil && ip.IsValid() {
|
|
// Try again if this is an allowlisted connection
|
|
// Failed to open connection, let's see if this was allowlisted and try again
|
|
allowed := r.allowlist.Allowed(endpoint)
|
|
if allowed {
|
|
conn.Done()
|
|
conn = newAllowListedConnectionScope(dir, usefd, r.limits.GetConnLimits(), r, endpoint)
|
|
err = conn.AddConn(dir, usefd)
|
|
}
|
|
}
|
|
|
|
if err != nil {
|
|
conn.Done()
|
|
r.metrics.BlockConn(dir, usefd)
|
|
return nil, err
|
|
}
|
|
|
|
r.metrics.AllowConn(dir, usefd)
|
|
return conn, nil
|
|
}
|
|
|
|
func (r *resourceManager) OpenStream(p peer.ID, dir network.Direction) (network.StreamManagementScope, error) {
|
|
peer := r.getPeerScope(p)
|
|
stream := newStreamScope(dir, r.limits.GetStreamLimits(p), peer, r)
|
|
peer.DecRef() // we have the reference in edges
|
|
|
|
err := stream.AddStream(dir)
|
|
if err != nil {
|
|
stream.Done()
|
|
r.metrics.BlockStream(p, dir)
|
|
return nil, err
|
|
}
|
|
|
|
r.metrics.AllowStream(p, dir)
|
|
return stream, nil
|
|
}
|
|
|
|
func (r *resourceManager) Close() error {
|
|
r.cancel()
|
|
r.wg.Wait()
|
|
r.trace.Close()
|
|
|
|
return nil
|
|
}
|
|
|
|
func (r *resourceManager) background() {
|
|
defer r.wg.Done()
|
|
|
|
// periodically garbage collects unused peer and protocol scopes
|
|
ticker := time.NewTicker(time.Minute)
|
|
defer ticker.Stop()
|
|
|
|
for {
|
|
select {
|
|
case <-ticker.C:
|
|
r.gc()
|
|
case <-r.cancelCtx.Done():
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func (r *resourceManager) gc() {
|
|
r.mx.Lock()
|
|
defer r.mx.Unlock()
|
|
|
|
for proto, s := range r.proto {
|
|
_, sticky := r.stickyProto[proto]
|
|
if sticky {
|
|
continue
|
|
}
|
|
if s.IsUnused() {
|
|
s.Done()
|
|
delete(r.proto, proto)
|
|
}
|
|
}
|
|
|
|
var deadPeers []peer.ID
|
|
for p, s := range r.peer {
|
|
_, sticky := r.stickyPeer[p]
|
|
if sticky {
|
|
continue
|
|
}
|
|
|
|
if s.IsUnused() {
|
|
s.Done()
|
|
delete(r.peer, p)
|
|
deadPeers = append(deadPeers, p)
|
|
}
|
|
}
|
|
|
|
for _, s := range r.svc {
|
|
s.Lock()
|
|
for _, p := range deadPeers {
|
|
ps, ok := s.peers[p]
|
|
if ok {
|
|
ps.Done()
|
|
delete(s.peers, p)
|
|
}
|
|
}
|
|
s.Unlock()
|
|
}
|
|
|
|
for _, s := range r.proto {
|
|
s.Lock()
|
|
for _, p := range deadPeers {
|
|
ps, ok := s.peers[p]
|
|
if ok {
|
|
ps.Done()
|
|
delete(s.peers, p)
|
|
}
|
|
}
|
|
s.Unlock()
|
|
}
|
|
}
|
|
|
|
func newSystemScope(limit Limit, rcmgr *resourceManager, name string) *systemScope {
|
|
return &systemScope{
|
|
resourceScope: newResourceScope(limit, nil, name, rcmgr.trace, rcmgr.metrics),
|
|
}
|
|
}
|
|
|
|
func newTransientScope(limit Limit, rcmgr *resourceManager, name string, systemScope *resourceScope) *transientScope {
|
|
return &transientScope{
|
|
resourceScope: newResourceScope(limit,
|
|
[]*resourceScope{systemScope},
|
|
name, rcmgr.trace, rcmgr.metrics),
|
|
system: rcmgr.system,
|
|
}
|
|
}
|
|
|
|
func newServiceScope(service string, limit Limit, rcmgr *resourceManager) *serviceScope {
|
|
return &serviceScope{
|
|
resourceScope: newResourceScope(limit,
|
|
[]*resourceScope{rcmgr.system.resourceScope},
|
|
fmt.Sprintf("service:%s", service), rcmgr.trace, rcmgr.metrics),
|
|
service: service,
|
|
rcmgr: rcmgr,
|
|
}
|
|
}
|
|
|
|
func newProtocolScope(proto protocol.ID, limit Limit, rcmgr *resourceManager) *protocolScope {
|
|
return &protocolScope{
|
|
resourceScope: newResourceScope(limit,
|
|
[]*resourceScope{rcmgr.system.resourceScope},
|
|
fmt.Sprintf("protocol:%s", proto), rcmgr.trace, rcmgr.metrics),
|
|
proto: proto,
|
|
rcmgr: rcmgr,
|
|
}
|
|
}
|
|
|
|
func newPeerScope(p peer.ID, limit Limit, rcmgr *resourceManager) *peerScope {
|
|
return &peerScope{
|
|
resourceScope: newResourceScope(limit,
|
|
[]*resourceScope{rcmgr.system.resourceScope},
|
|
peerScopeName(p), rcmgr.trace, rcmgr.metrics),
|
|
peer: p,
|
|
rcmgr: rcmgr,
|
|
}
|
|
}
|
|
|
|
func newConnectionScope(dir network.Direction, usefd bool, limit Limit, rcmgr *resourceManager, endpoint multiaddr.Multiaddr, ip netip.Addr) *connectionScope {
|
|
return &connectionScope{
|
|
resourceScope: newResourceScope(limit,
|
|
[]*resourceScope{rcmgr.transient.resourceScope, rcmgr.system.resourceScope},
|
|
connScopeName(rcmgr.nextConnId()), rcmgr.trace, rcmgr.metrics),
|
|
dir: dir,
|
|
usefd: usefd,
|
|
rcmgr: rcmgr,
|
|
endpoint: endpoint,
|
|
ip: ip,
|
|
}
|
|
}
|
|
|
|
func newAllowListedConnectionScope(dir network.Direction, usefd bool, limit Limit, rcmgr *resourceManager, endpoint multiaddr.Multiaddr) *connectionScope {
|
|
return &connectionScope{
|
|
resourceScope: newResourceScope(limit,
|
|
[]*resourceScope{rcmgr.allowlistedTransient.resourceScope, rcmgr.allowlistedSystem.resourceScope},
|
|
connScopeName(rcmgr.nextConnId()), rcmgr.trace, rcmgr.metrics),
|
|
dir: dir,
|
|
usefd: usefd,
|
|
rcmgr: rcmgr,
|
|
endpoint: endpoint,
|
|
isAllowlisted: true,
|
|
}
|
|
}
|
|
|
|
func newStreamScope(dir network.Direction, limit Limit, peer *peerScope, rcmgr *resourceManager) *streamScope {
|
|
return &streamScope{
|
|
resourceScope: newResourceScope(limit,
|
|
[]*resourceScope{peer.resourceScope, rcmgr.transient.resourceScope, rcmgr.system.resourceScope},
|
|
streamScopeName(rcmgr.nextStreamId()), rcmgr.trace, rcmgr.metrics),
|
|
dir: dir,
|
|
rcmgr: peer.rcmgr,
|
|
peer: peer,
|
|
}
|
|
}
|
|
|
|
func IsSystemScope(name string) bool {
|
|
return name == "system"
|
|
}
|
|
|
|
func IsTransientScope(name string) bool {
|
|
return name == "transient"
|
|
}
|
|
|
|
func streamScopeName(streamId int64) string {
|
|
return fmt.Sprintf("stream-%d", streamId)
|
|
}
|
|
|
|
func IsStreamScope(name string) bool {
|
|
return strings.HasPrefix(name, "stream-") && !IsSpan(name)
|
|
}
|
|
|
|
func connScopeName(streamId int64) string {
|
|
return fmt.Sprintf("conn-%d", streamId)
|
|
}
|
|
|
|
func IsConnScope(name string) bool {
|
|
return strings.HasPrefix(name, "conn-") && !IsSpan(name)
|
|
}
|
|
|
|
func peerScopeName(p peer.ID) string {
|
|
return fmt.Sprintf("peer:%s", p)
|
|
}
|
|
|
|
// PeerStrInScopeName returns "" if name is not a peerScopeName. Returns a string to avoid allocating a peer ID object
|
|
func PeerStrInScopeName(name string) string {
|
|
if !strings.HasPrefix(name, "peer:") || IsSpan(name) {
|
|
return ""
|
|
}
|
|
// Index to avoid allocating a new string
|
|
peerSplitIdx := strings.Index(name, "peer:")
|
|
if peerSplitIdx == -1 {
|
|
return ""
|
|
}
|
|
p := (name[peerSplitIdx+len("peer:"):])
|
|
return p
|
|
}
|
|
|
|
// ParseProtocolScopeName returns the service name if name is a serviceScopeName.
|
|
// Otherwise returns ""
|
|
func ParseProtocolScopeName(name string) string {
|
|
if strings.HasPrefix(name, "protocol:") && !IsSpan(name) {
|
|
if strings.Contains(name, "peer:") {
|
|
// This is a protocol peer scope
|
|
return ""
|
|
}
|
|
|
|
// Index to avoid allocating a new string
|
|
separatorIdx := strings.Index(name, ":")
|
|
if separatorIdx == -1 {
|
|
return ""
|
|
}
|
|
return name[separatorIdx+1:]
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (s *serviceScope) Name() string {
|
|
return s.service
|
|
}
|
|
|
|
func (s *serviceScope) getPeerScope(p peer.ID) *resourceScope {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
ps, ok := s.peers[p]
|
|
if ok {
|
|
ps.IncRef()
|
|
return ps
|
|
}
|
|
|
|
l := s.rcmgr.limits.GetServicePeerLimits(s.service)
|
|
|
|
if s.peers == nil {
|
|
s.peers = make(map[peer.ID]*resourceScope)
|
|
}
|
|
|
|
ps = newResourceScope(l, nil, fmt.Sprintf("%s.peer:%s", s.name, p), s.rcmgr.trace, s.rcmgr.metrics)
|
|
s.peers[p] = ps
|
|
|
|
ps.IncRef()
|
|
return ps
|
|
}
|
|
|
|
func (s *protocolScope) Protocol() protocol.ID {
|
|
return s.proto
|
|
}
|
|
|
|
func (s *protocolScope) getPeerScope(p peer.ID) *resourceScope {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
ps, ok := s.peers[p]
|
|
if ok {
|
|
ps.IncRef()
|
|
return ps
|
|
}
|
|
|
|
l := s.rcmgr.limits.GetProtocolPeerLimits(s.proto)
|
|
|
|
if s.peers == nil {
|
|
s.peers = make(map[peer.ID]*resourceScope)
|
|
}
|
|
|
|
ps = newResourceScope(l, nil, fmt.Sprintf("%s.peer:%s", s.name, p), s.rcmgr.trace, s.rcmgr.metrics)
|
|
s.peers[p] = ps
|
|
|
|
ps.IncRef()
|
|
return ps
|
|
}
|
|
|
|
func (s *peerScope) Peer() peer.ID {
|
|
return s.peer
|
|
}
|
|
|
|
func (s *connectionScope) PeerScope() network.PeerScope {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
// avoid nil is not nil footgun; go....
|
|
if s.peer == nil {
|
|
return nil
|
|
}
|
|
|
|
return s.peer
|
|
}
|
|
|
|
func (s *connectionScope) Done() {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
if s.done {
|
|
return
|
|
}
|
|
if s.ip.IsValid() {
|
|
s.rcmgr.connLimiter.rmConn(s.ip)
|
|
}
|
|
s.resourceScope.doneUnlocked()
|
|
}
|
|
|
|
// transferAllowedToStandard transfers this connection scope from being part of
|
|
// the allowlist set of scopes to being part of the standard set of scopes.
|
|
// Happens when we first allowlisted this connection due to its IP, but later
|
|
// discovered that the peer id not what we expected.
|
|
func (s *connectionScope) transferAllowedToStandard() (err error) {
|
|
|
|
systemScope := s.rcmgr.system.resourceScope
|
|
transientScope := s.rcmgr.transient.resourceScope
|
|
|
|
stat := s.resourceScope.rc.stat()
|
|
|
|
for _, scope := range s.edges {
|
|
scope.ReleaseForChild(stat)
|
|
scope.DecRef() // removed from edges
|
|
}
|
|
s.edges = nil
|
|
|
|
if err := systemScope.ReserveForChild(stat); err != nil {
|
|
return err
|
|
}
|
|
systemScope.IncRef()
|
|
|
|
// Undo this if we fail later
|
|
defer func() {
|
|
if err != nil {
|
|
systemScope.ReleaseForChild(stat)
|
|
systemScope.DecRef()
|
|
}
|
|
}()
|
|
|
|
if err := transientScope.ReserveForChild(stat); err != nil {
|
|
return err
|
|
}
|
|
transientScope.IncRef()
|
|
|
|
// Update edges
|
|
s.edges = []*resourceScope{
|
|
systemScope,
|
|
transientScope,
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (s *connectionScope) SetPeer(p peer.ID) error {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
if s.peer != nil {
|
|
return fmt.Errorf("connection scope already attached to a peer")
|
|
}
|
|
|
|
system := s.rcmgr.system
|
|
transient := s.rcmgr.transient
|
|
|
|
if s.isAllowlisted {
|
|
system = s.rcmgr.allowlistedSystem
|
|
transient = s.rcmgr.allowlistedTransient
|
|
|
|
if !s.rcmgr.allowlist.AllowedPeerAndMultiaddr(p, s.endpoint) {
|
|
s.isAllowlisted = false
|
|
|
|
// This is not an allowed peer + multiaddr combination. We need to
|
|
// transfer this connection to the general scope. We'll do this first by
|
|
// transferring the connection to the system and transient scopes, then
|
|
// continue on with this function. The idea is that a connection
|
|
// shouldn't get the benefit of evading the transient scope because it
|
|
// was _almost_ an allowlisted connection.
|
|
if err := s.transferAllowedToStandard(); err != nil {
|
|
// Failed to transfer this connection to the standard scopes
|
|
return err
|
|
}
|
|
|
|
// set the system and transient scopes to the non-allowlisted ones
|
|
system = s.rcmgr.system
|
|
transient = s.rcmgr.transient
|
|
}
|
|
}
|
|
|
|
s.peer = s.rcmgr.getPeerScope(p)
|
|
|
|
// juggle resources from transient scope to peer scope
|
|
stat := s.resourceScope.rc.stat()
|
|
if err := s.peer.ReserveForChild(stat); err != nil {
|
|
s.peer.DecRef()
|
|
s.peer = nil
|
|
s.rcmgr.metrics.BlockPeer(p)
|
|
return err
|
|
}
|
|
|
|
transient.ReleaseForChild(stat)
|
|
transient.DecRef() // removed from edges
|
|
|
|
// update edges
|
|
edges := []*resourceScope{
|
|
s.peer.resourceScope,
|
|
system.resourceScope,
|
|
}
|
|
s.resourceScope.edges = edges
|
|
|
|
s.rcmgr.metrics.AllowPeer(p)
|
|
return nil
|
|
}
|
|
|
|
func (s *streamScope) ProtocolScope() network.ProtocolScope {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
// avoid nil is not nil footgun; go....
|
|
if s.proto == nil {
|
|
return nil
|
|
}
|
|
|
|
return s.proto
|
|
}
|
|
|
|
func (s *streamScope) SetProtocol(proto protocol.ID) error {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
if s.proto != nil {
|
|
return fmt.Errorf("stream scope already attached to a protocol")
|
|
}
|
|
|
|
s.proto = s.rcmgr.getProtocolScope(proto)
|
|
|
|
// juggle resources from transient scope to protocol scope
|
|
stat := s.resourceScope.rc.stat()
|
|
if err := s.proto.ReserveForChild(stat); err != nil {
|
|
s.proto.DecRef()
|
|
s.proto = nil
|
|
s.rcmgr.metrics.BlockProtocol(proto)
|
|
return err
|
|
}
|
|
|
|
s.peerProtoScope = s.proto.getPeerScope(s.peer.peer)
|
|
if err := s.peerProtoScope.ReserveForChild(stat); err != nil {
|
|
s.proto.ReleaseForChild(stat)
|
|
s.proto.DecRef()
|
|
s.proto = nil
|
|
s.peerProtoScope.DecRef()
|
|
s.peerProtoScope = nil
|
|
s.rcmgr.metrics.BlockProtocolPeer(proto, s.peer.peer)
|
|
return err
|
|
}
|
|
|
|
s.rcmgr.transient.ReleaseForChild(stat)
|
|
s.rcmgr.transient.DecRef() // removed from edges
|
|
|
|
// update edges
|
|
edges := []*resourceScope{
|
|
s.peer.resourceScope,
|
|
s.peerProtoScope,
|
|
s.proto.resourceScope,
|
|
s.rcmgr.system.resourceScope,
|
|
}
|
|
s.resourceScope.edges = edges
|
|
|
|
s.rcmgr.metrics.AllowProtocol(proto)
|
|
return nil
|
|
}
|
|
|
|
func (s *streamScope) ServiceScope() network.ServiceScope {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
// avoid nil is not nil footgun; go....
|
|
if s.svc == nil {
|
|
return nil
|
|
}
|
|
|
|
return s.svc
|
|
}
|
|
|
|
func (s *streamScope) SetService(svc string) error {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
if s.svc != nil {
|
|
return fmt.Errorf("stream scope already attached to a service")
|
|
}
|
|
if s.proto == nil {
|
|
return fmt.Errorf("stream scope not attached to a protocol")
|
|
}
|
|
|
|
s.svc = s.rcmgr.getServiceScope(svc)
|
|
|
|
// reserve resources in service
|
|
stat := s.resourceScope.rc.stat()
|
|
if err := s.svc.ReserveForChild(stat); err != nil {
|
|
s.svc.DecRef()
|
|
s.svc = nil
|
|
s.rcmgr.metrics.BlockService(svc)
|
|
return err
|
|
}
|
|
|
|
// get the per peer service scope constraint, if any
|
|
s.peerSvcScope = s.svc.getPeerScope(s.peer.peer)
|
|
if err := s.peerSvcScope.ReserveForChild(stat); err != nil {
|
|
s.svc.ReleaseForChild(stat)
|
|
s.svc.DecRef()
|
|
s.svc = nil
|
|
s.peerSvcScope.DecRef()
|
|
s.peerSvcScope = nil
|
|
s.rcmgr.metrics.BlockServicePeer(svc, s.peer.peer)
|
|
return err
|
|
}
|
|
|
|
// update edges
|
|
edges := []*resourceScope{
|
|
s.peer.resourceScope,
|
|
s.peerProtoScope,
|
|
s.peerSvcScope,
|
|
s.proto.resourceScope,
|
|
s.svc.resourceScope,
|
|
s.rcmgr.system.resourceScope,
|
|
}
|
|
s.resourceScope.edges = edges
|
|
|
|
s.rcmgr.metrics.AllowService(svc)
|
|
return nil
|
|
}
|
|
|
|
func (s *streamScope) PeerScope() network.PeerScope {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
|
|
// avoid nil is not nil footgun; go....
|
|
if s.peer == nil {
|
|
return nil
|
|
}
|
|
|
|
return s.peer
|
|
}
|