mirror of
https://github.com/Chia-Network/chia-blockchain.git
synced 2024-11-13 03:12:24 +03:00
ca84fa9f8d
* stash * change log level * stash changes * cat tests * add node id chia show * make max sibscribe items configurable * lint * add logs for limits * paralelize incluzion valdiation, don't diconnet from remote peers until local peer in synced * wallet rate limit * test log lvl, trusted, black * only validation under semaphore * flake mypy trade test * reduce flakyness * merge fix * rename * linting * validate parallel, apply serial * reduce falkyness * lint * Fix CAT tests * black * flaky test, total amount * fix cat test * skip existing state * skip existing * try other caches * flake8 Co-authored-by: Matt Hauff <quexington@gmail.com> Co-authored-by: William Blanke <wjb98672@gmail.com>
211 lines
11 KiB
Python
211 lines
11 KiB
Python
import dataclasses
|
|
import logging
|
|
import time
|
|
from collections import Counter
|
|
from typing import Optional
|
|
|
|
from chia.protocols.protocol_message_types import ProtocolMessageTypes
|
|
from chia.server.outbound_message import Message
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
@dataclasses.dataclass(frozen=True)
|
|
class RLSettings:
|
|
frequency: int
|
|
max_size: int
|
|
max_total_size: Optional[int] = None
|
|
|
|
|
|
DEFAULT_SETTINGS = RLSettings(100, 1024 * 1024, 100 * 1024 * 1024)
|
|
|
|
# All non-transaction apis also have an aggregate limit
|
|
NON_TX_FREQ = 1000
|
|
NON_TX_MAX_TOTAL_SIZE = 100 * 1024 * 1024
|
|
|
|
|
|
# The three values in the tuple correspond to the three limits above
|
|
# The third is optional
|
|
|
|
rate_limits_tx = {
|
|
ProtocolMessageTypes.new_transaction: RLSettings(5000, 100, 5000 * 100),
|
|
ProtocolMessageTypes.request_transaction: RLSettings(5000, 100, 5000 * 100),
|
|
ProtocolMessageTypes.respond_transaction: RLSettings(5000, 1 * 1024 * 1024, 20 * 1024 * 1024), # TODO: check this
|
|
ProtocolMessageTypes.send_transaction: RLSettings(5000, 1024 * 1024),
|
|
ProtocolMessageTypes.transaction_ack: RLSettings(5000, 2048),
|
|
}
|
|
|
|
rate_limits_other = {
|
|
ProtocolMessageTypes.handshake: RLSettings(5, 10 * 1024, 5 * 10 * 1024),
|
|
ProtocolMessageTypes.harvester_handshake: RLSettings(5, 1024 * 1024),
|
|
ProtocolMessageTypes.new_signage_point_harvester: RLSettings(100, 1024),
|
|
ProtocolMessageTypes.new_proof_of_space: RLSettings(100, 2048),
|
|
ProtocolMessageTypes.request_signatures: RLSettings(100, 2048),
|
|
ProtocolMessageTypes.respond_signatures: RLSettings(100, 2048),
|
|
ProtocolMessageTypes.new_signage_point: RLSettings(200, 2048),
|
|
ProtocolMessageTypes.declare_proof_of_space: RLSettings(100, 10 * 1024),
|
|
ProtocolMessageTypes.request_signed_values: RLSettings(100, 512),
|
|
ProtocolMessageTypes.farming_info: RLSettings(100, 1024),
|
|
ProtocolMessageTypes.signed_values: RLSettings(100, 1024),
|
|
ProtocolMessageTypes.new_peak_timelord: RLSettings(100, 20 * 1024),
|
|
ProtocolMessageTypes.new_unfinished_block_timelord: RLSettings(100, 10 * 1024),
|
|
ProtocolMessageTypes.new_signage_point_vdf: RLSettings(100, 100 * 1024),
|
|
ProtocolMessageTypes.new_infusion_point_vdf: RLSettings(100, 100 * 1024),
|
|
ProtocolMessageTypes.new_end_of_sub_slot_vdf: RLSettings(100, 100 * 1024),
|
|
ProtocolMessageTypes.request_compact_proof_of_time: RLSettings(100, 10 * 1024),
|
|
ProtocolMessageTypes.respond_compact_proof_of_time: RLSettings(100, 100 * 1024),
|
|
ProtocolMessageTypes.new_peak: RLSettings(200, 512),
|
|
ProtocolMessageTypes.request_proof_of_weight: RLSettings(5, 100),
|
|
ProtocolMessageTypes.respond_proof_of_weight: RLSettings(5, 50 * 1024 * 1024, 100 * 1024 * 1024),
|
|
ProtocolMessageTypes.request_block: RLSettings(200, 100),
|
|
ProtocolMessageTypes.reject_block: RLSettings(200, 100),
|
|
ProtocolMessageTypes.request_blocks: RLSettings(500, 100),
|
|
ProtocolMessageTypes.respond_blocks: RLSettings(100, 50 * 1024 * 1024, 5 * 50 * 1024 * 1024),
|
|
ProtocolMessageTypes.reject_blocks: RLSettings(100, 100),
|
|
ProtocolMessageTypes.respond_block: RLSettings(200, 2 * 1024 * 1024, 10 * 2 * 1024 * 1024),
|
|
ProtocolMessageTypes.new_unfinished_block: RLSettings(200, 100),
|
|
ProtocolMessageTypes.request_unfinished_block: RLSettings(200, 100),
|
|
ProtocolMessageTypes.respond_unfinished_block: RLSettings(200, 2 * 1024 * 1024, 10 * 2 * 1024 * 1024),
|
|
ProtocolMessageTypes.new_signage_point_or_end_of_sub_slot: RLSettings(200, 200),
|
|
ProtocolMessageTypes.request_signage_point_or_end_of_sub_slot: RLSettings(200, 200),
|
|
ProtocolMessageTypes.respond_signage_point: RLSettings(200, 50 * 1024),
|
|
ProtocolMessageTypes.respond_end_of_sub_slot: RLSettings(100, 50 * 1024),
|
|
ProtocolMessageTypes.request_mempool_transactions: RLSettings(5, 1024 * 1024),
|
|
ProtocolMessageTypes.request_compact_vdf: RLSettings(200, 1024),
|
|
ProtocolMessageTypes.respond_compact_vdf: RLSettings(200, 100 * 1024),
|
|
ProtocolMessageTypes.new_compact_vdf: RLSettings(100, 1024),
|
|
ProtocolMessageTypes.request_peers: RLSettings(10, 100),
|
|
ProtocolMessageTypes.respond_peers: RLSettings(10, 1 * 1024 * 1024),
|
|
ProtocolMessageTypes.request_puzzle_solution: RLSettings(1000, 100),
|
|
ProtocolMessageTypes.respond_puzzle_solution: RLSettings(1000, 1024 * 1024),
|
|
ProtocolMessageTypes.reject_puzzle_solution: RLSettings(1000, 100),
|
|
ProtocolMessageTypes.new_peak_wallet: RLSettings(200, 300),
|
|
ProtocolMessageTypes.request_block_header: RLSettings(500, 100),
|
|
ProtocolMessageTypes.respond_block_header: RLSettings(500, 500 * 1024),
|
|
ProtocolMessageTypes.reject_header_request: RLSettings(500, 100),
|
|
ProtocolMessageTypes.request_removals: RLSettings(500, 50 * 1024, 10 * 1024 * 1024),
|
|
ProtocolMessageTypes.respond_removals: RLSettings(500, 1024 * 1024, 10 * 1024 * 1024),
|
|
ProtocolMessageTypes.reject_removals_request: RLSettings(500, 100),
|
|
ProtocolMessageTypes.request_additions: RLSettings(500, 1024 * 1024, 10 * 1024 * 1024),
|
|
ProtocolMessageTypes.respond_additions: RLSettings(500, 1024 * 1024, 10 * 1024 * 1024),
|
|
ProtocolMessageTypes.reject_additions_request: RLSettings(500, 100),
|
|
ProtocolMessageTypes.request_header_blocks: RLSettings(500, 100),
|
|
ProtocolMessageTypes.reject_header_blocks: RLSettings(100, 100),
|
|
ProtocolMessageTypes.respond_header_blocks: RLSettings(500, 2 * 1024 * 1024, 100 * 1024 * 1024),
|
|
ProtocolMessageTypes.request_peers_introducer: RLSettings(100, 100),
|
|
ProtocolMessageTypes.respond_peers_introducer: RLSettings(100, 1024 * 1024),
|
|
ProtocolMessageTypes.farm_new_block: RLSettings(200, 200),
|
|
ProtocolMessageTypes.request_plots: RLSettings(10, 10 * 1024 * 1024),
|
|
ProtocolMessageTypes.respond_plots: RLSettings(10, 100 * 1024 * 1024),
|
|
ProtocolMessageTypes.coin_state_update: RLSettings(1000, 100 * 1024 * 1024),
|
|
ProtocolMessageTypes.register_interest_in_puzzle_hash: RLSettings(1000, 100 * 1024 * 1024),
|
|
ProtocolMessageTypes.respond_to_ph_update: RLSettings(1000, 100 * 1024 * 1024),
|
|
ProtocolMessageTypes.register_interest_in_coin: RLSettings(1000, 100 * 1024 * 1024),
|
|
ProtocolMessageTypes.respond_to_coin_update: RLSettings(1000, 100 * 1024 * 1024),
|
|
ProtocolMessageTypes.request_ses_hashes: RLSettings(2000, 1 * 1024 * 1024),
|
|
ProtocolMessageTypes.respond_ses_hashes: RLSettings(2000, 1 * 1024 * 1024),
|
|
ProtocolMessageTypes.request_children: RLSettings(2000, 1024 * 1024),
|
|
ProtocolMessageTypes.respond_children: RLSettings(2000, 1 * 1024 * 1024),
|
|
}
|
|
|
|
|
|
# TODO: only full node disconnects based on rate limits
|
|
|
|
|
|
class RateLimiter:
|
|
incoming: bool
|
|
reset_seconds: int
|
|
current_minute: int
|
|
message_counts: Counter
|
|
message_cumulative_sizes: Counter
|
|
percentage_of_limit: int
|
|
non_tx_message_counts: int = 0
|
|
non_tx_cumulative_size: int = 0
|
|
|
|
def __init__(self, incoming: bool, reset_seconds=60, percentage_of_limit=100):
|
|
"""
|
|
The incoming parameter affects whether counters are incremented
|
|
unconditionally or not. For incoming messages, the counters are always
|
|
incremeneted. For outgoing messages, the counters are only incremented
|
|
if they are allowed to be sent by the rate limiter, since we won't send
|
|
the messages otherwise.
|
|
"""
|
|
self.incoming = incoming
|
|
self.reset_seconds = reset_seconds
|
|
self.current_minute = time.time() // reset_seconds
|
|
self.message_counts = Counter()
|
|
self.message_cumulative_sizes = Counter()
|
|
self.percentage_of_limit = percentage_of_limit
|
|
self.non_tx_message_counts = 0
|
|
self.non_tx_cumulative_size = 0
|
|
|
|
def process_msg_and_check(self, message: Message) -> bool:
|
|
"""
|
|
Returns True if message can be processed successfully, false if a rate limit is passed.
|
|
"""
|
|
|
|
current_minute = int(time.time() // self.reset_seconds)
|
|
if current_minute != self.current_minute:
|
|
self.current_minute = current_minute
|
|
self.message_counts = Counter()
|
|
self.message_cumulative_sizes = Counter()
|
|
self.non_tx_message_counts = 0
|
|
self.non_tx_cumulative_size = 0
|
|
try:
|
|
message_type = ProtocolMessageTypes(message.type)
|
|
except Exception as e:
|
|
log.warning(f"Invalid message: {message.type}, {e}")
|
|
return True
|
|
|
|
new_message_counts: int = self.message_counts[message_type] + 1
|
|
new_cumulative_size: int = self.message_cumulative_sizes[message_type] + len(message.data)
|
|
new_non_tx_count: int = self.non_tx_message_counts
|
|
new_non_tx_size: int = self.non_tx_cumulative_size
|
|
proportion_of_limit: float = self.percentage_of_limit / 100
|
|
|
|
ret: bool = False
|
|
try:
|
|
|
|
limits = DEFAULT_SETTINGS
|
|
if message_type in rate_limits_tx:
|
|
limits = rate_limits_tx[message_type]
|
|
elif message_type in rate_limits_other:
|
|
limits = rate_limits_other[message_type]
|
|
new_non_tx_count = self.non_tx_message_counts + 1
|
|
new_non_tx_size = self.non_tx_cumulative_size + len(message.data)
|
|
if new_non_tx_count > NON_TX_FREQ * proportion_of_limit:
|
|
log.debug(f"Rate limit: {new_non_tx_count} > {NON_TX_FREQ} * {proportion_of_limit}")
|
|
return False
|
|
if new_non_tx_size > NON_TX_MAX_TOTAL_SIZE * proportion_of_limit:
|
|
log.debug(f"Rate limit: {new_non_tx_size} > {NON_TX_MAX_TOTAL_SIZE} * {proportion_of_limit}")
|
|
return False
|
|
else:
|
|
log.warning(f"Message type {message_type} not found in rate limits")
|
|
|
|
if limits.max_total_size is None:
|
|
limits = dataclasses.replace(limits, max_total_size=limits.frequency * limits.max_size)
|
|
assert limits.max_total_size is not None
|
|
|
|
if new_message_counts > limits.frequency * proportion_of_limit:
|
|
log.debug(f"Rate limit: {new_message_counts} > {limits.frequency} * {proportion_of_limit}")
|
|
return False
|
|
if len(message.data) > limits.max_size:
|
|
log.debug(f"Rate limit: {len(message.data)} > {limits.max_size}")
|
|
return False
|
|
if new_cumulative_size > limits.max_total_size * proportion_of_limit:
|
|
log.debug(f"Rate limit: {new_cumulative_size} > {limits.max_total_size} * {proportion_of_limit}")
|
|
return False
|
|
|
|
ret = True
|
|
return True
|
|
finally:
|
|
if self.incoming or ret:
|
|
# now that we determined that it's OK to send the message, commit the
|
|
# updates to the counters. Alternatively, if this was an
|
|
# incoming message, we already received it and it should
|
|
# increment the counters unconditionally
|
|
self.message_counts[message_type] = new_message_counts
|
|
self.message_cumulative_sizes[message_type] = new_cumulative_size
|
|
self.non_tx_message_counts = new_non_tx_count
|
|
self.non_tx_cumulative_size = new_non_tx_size
|