2018-05-03 13:04:00 +00:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0
|
|
|
|
*
|
2018-09-05 21:54:31 +00:00
|
|
|
* Copyright (C) 2017-2018 WireGuard LLC. All Rights Reserved.
|
2018-05-03 13:04:00 +00:00
|
|
|
*/
|
2017-07-12 21:11:49 +00:00
|
|
|
|
2018-05-03 13:04:00 +00:00
|
|
|
package ratelimiter
|
2017-07-11 16:48:29 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"net"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2018-02-11 22:01:55 +00:00
|
|
|
packetsPerSecond = 20
|
|
|
|
packetsBurstable = 5
|
|
|
|
garbageCollectTime = time.Second
|
|
|
|
packetCost = 1000000000 / packetsPerSecond
|
|
|
|
maxTokens = packetCost * packetsBurstable
|
2017-07-11 16:48:29 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type RatelimiterEntry struct {
|
|
|
|
mutex sync.Mutex
|
|
|
|
lastTime time.Time
|
|
|
|
tokens int64
|
|
|
|
}
|
|
|
|
|
|
|
|
type Ratelimiter struct {
|
2018-02-11 21:53:39 +00:00
|
|
|
mutex sync.RWMutex
|
2018-05-21 01:18:56 +00:00
|
|
|
stopReset chan struct{}
|
2018-02-11 21:53:39 +00:00
|
|
|
tableIPv4 map[[net.IPv4len]byte]*RatelimiterEntry
|
|
|
|
tableIPv6 map[[net.IPv6len]byte]*RatelimiterEntry
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rate *Ratelimiter) Close() {
|
|
|
|
rate.mutex.Lock()
|
|
|
|
defer rate.mutex.Unlock()
|
|
|
|
|
2018-05-21 01:18:56 +00:00
|
|
|
if rate.stopReset != nil {
|
|
|
|
close(rate.stopReset)
|
2018-02-11 21:53:39 +00:00
|
|
|
}
|
2017-07-11 16:48:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (rate *Ratelimiter) Init() {
|
|
|
|
rate.mutex.Lock()
|
|
|
|
defer rate.mutex.Unlock()
|
2018-02-11 21:53:39 +00:00
|
|
|
|
2018-02-11 22:01:55 +00:00
|
|
|
// stop any ongoing garbage collection routine
|
|
|
|
|
2018-05-21 01:18:56 +00:00
|
|
|
if rate.stopReset != nil {
|
|
|
|
close(rate.stopReset)
|
2018-02-11 21:53:39 +00:00
|
|
|
}
|
|
|
|
|
2018-05-21 01:18:56 +00:00
|
|
|
rate.stopReset = make(chan struct{})
|
2017-07-11 16:48:29 +00:00
|
|
|
rate.tableIPv4 = make(map[[net.IPv4len]byte]*RatelimiterEntry)
|
|
|
|
rate.tableIPv6 = make(map[[net.IPv6len]byte]*RatelimiterEntry)
|
2018-02-11 21:53:39 +00:00
|
|
|
|
2018-02-11 22:01:55 +00:00
|
|
|
// start garbage collection routine
|
|
|
|
|
2018-02-11 21:53:39 +00:00
|
|
|
go func() {
|
2018-05-13 16:42:06 +00:00
|
|
|
ticker := time.NewTicker(time.Second)
|
2018-05-21 01:18:56 +00:00
|
|
|
ticker.Stop()
|
2018-02-11 21:53:39 +00:00
|
|
|
for {
|
|
|
|
select {
|
2018-05-21 01:18:56 +00:00
|
|
|
case _, ok := <-rate.stopReset:
|
2018-05-13 16:42:06 +00:00
|
|
|
ticker.Stop()
|
2018-05-21 01:18:56 +00:00
|
|
|
if ok {
|
|
|
|
ticker = time.NewTicker(time.Second)
|
|
|
|
} else {
|
|
|
|
return
|
|
|
|
}
|
2018-05-13 16:42:06 +00:00
|
|
|
case <-ticker.C:
|
2018-02-11 22:01:55 +00:00
|
|
|
func() {
|
|
|
|
rate.mutex.Lock()
|
|
|
|
defer rate.mutex.Unlock()
|
|
|
|
|
|
|
|
for key, entry := range rate.tableIPv4 {
|
|
|
|
entry.mutex.Lock()
|
|
|
|
if time.Now().Sub(entry.lastTime) > garbageCollectTime {
|
|
|
|
delete(rate.tableIPv4, key)
|
|
|
|
}
|
|
|
|
entry.mutex.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
for key, entry := range rate.tableIPv6 {
|
|
|
|
entry.mutex.Lock()
|
|
|
|
if time.Now().Sub(entry.lastTime) > garbageCollectTime {
|
|
|
|
delete(rate.tableIPv6, key)
|
|
|
|
}
|
|
|
|
entry.mutex.Unlock()
|
|
|
|
}
|
2018-05-21 01:18:56 +00:00
|
|
|
|
|
|
|
if len(rate.tableIPv4) == 0 && len(rate.tableIPv6) == 0 {
|
|
|
|
ticker.Stop()
|
|
|
|
}
|
2018-02-11 22:01:55 +00:00
|
|
|
}()
|
2018-02-11 21:53:39 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
2017-07-11 16:48:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (rate *Ratelimiter) Allow(ip net.IP) bool {
|
|
|
|
var entry *RatelimiterEntry
|
2018-05-13 16:42:06 +00:00
|
|
|
var keyIPv4 [net.IPv4len]byte
|
|
|
|
var keyIPv6 [net.IPv6len]byte
|
2017-07-11 16:48:29 +00:00
|
|
|
|
|
|
|
// lookup entry
|
|
|
|
|
|
|
|
IPv4 := ip.To4()
|
|
|
|
IPv6 := ip.To16()
|
|
|
|
|
|
|
|
rate.mutex.RLock()
|
|
|
|
|
|
|
|
if IPv4 != nil {
|
2018-05-13 16:42:06 +00:00
|
|
|
copy(keyIPv4[:], IPv4)
|
|
|
|
entry = rate.tableIPv4[keyIPv4]
|
2017-07-11 16:48:29 +00:00
|
|
|
} else {
|
2018-05-13 16:42:06 +00:00
|
|
|
copy(keyIPv6[:], IPv6)
|
|
|
|
entry = rate.tableIPv6[keyIPv6]
|
2017-07-11 16:48:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rate.mutex.RUnlock()
|
|
|
|
|
|
|
|
// make new entry if not found
|
|
|
|
|
|
|
|
if entry == nil {
|
|
|
|
entry = new(RatelimiterEntry)
|
2018-02-11 22:01:55 +00:00
|
|
|
entry.tokens = maxTokens - packetCost
|
2017-07-11 16:48:29 +00:00
|
|
|
entry.lastTime = time.Now()
|
2018-05-13 16:42:06 +00:00
|
|
|
rate.mutex.Lock()
|
2017-07-11 16:48:29 +00:00
|
|
|
if IPv4 != nil {
|
2018-05-13 16:42:06 +00:00
|
|
|
rate.tableIPv4[keyIPv4] = entry
|
2018-05-21 01:18:56 +00:00
|
|
|
if len(rate.tableIPv4) == 1 && len(rate.tableIPv6) == 0 {
|
|
|
|
rate.stopReset <- struct{}{}
|
|
|
|
}
|
2017-07-11 16:48:29 +00:00
|
|
|
} else {
|
2018-05-13 16:42:06 +00:00
|
|
|
rate.tableIPv6[keyIPv6] = entry
|
2018-05-21 01:18:56 +00:00
|
|
|
if len(rate.tableIPv6) == 1 && len(rate.tableIPv4) == 0 {
|
|
|
|
rate.stopReset <- struct{}{}
|
|
|
|
}
|
2017-07-11 16:48:29 +00:00
|
|
|
}
|
|
|
|
rate.mutex.Unlock()
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// add tokens to entry
|
|
|
|
|
|
|
|
entry.mutex.Lock()
|
|
|
|
now := time.Now()
|
|
|
|
entry.tokens += now.Sub(entry.lastTime).Nanoseconds()
|
|
|
|
entry.lastTime = now
|
2018-02-11 22:01:55 +00:00
|
|
|
if entry.tokens > maxTokens {
|
|
|
|
entry.tokens = maxTokens
|
2017-07-11 16:48:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// subtract cost of packet
|
|
|
|
|
2018-02-11 22:01:55 +00:00
|
|
|
if entry.tokens > packetCost {
|
|
|
|
entry.tokens -= packetCost
|
2017-07-11 16:48:29 +00:00
|
|
|
entry.mutex.Unlock()
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
entry.mutex.Unlock()
|
|
|
|
return false
|
|
|
|
}
|