add http、http2、socks5、relay access speed limiter

This commit is contained in:
tongsq 2022-04-18 19:57:41 +08:00
parent 87d6a2fdc2
commit 0dd8bbb935
10 changed files with 420 additions and 2 deletions

1
.gitignore vendored
View File

@ -33,3 +33,4 @@ _testmain.go
.vscode/
cmd/gost/gost
.idea

View File

@ -148,6 +148,26 @@ func parseAuthenticator(s string) (gost.Authenticator, error) {
return au, nil
}
func parseLimiter(s string) (gost.Limiter, error) {
if s == "" {
return nil, nil
}
f, err := os.Open(s)
if err != nil {
return nil, err
}
defer f.Close()
l, _ := gost.NewLocalLimiter("", "")
err = l.Reload(f)
if err != nil {
return nil, err
}
go gost.PeriodReload(l, s)
return l, nil
}
func parseIP(s string, port string) (ips []string) {
if s == "" {
return

View File

@ -386,6 +386,19 @@ func (r *route) GenRouters() ([]router, error) {
node.User = users[0]
}
}
//init rate limiter
limiterHandler, err := parseLimiter(node.Get("secrets"))
if err != nil {
return nil, err
}
if limiterHandler == nil && strings.TrimSpace(node.Get("limiter")) != "" && node.User != nil {
limiterHandler, err = gost.NewLocalLimiter(node.User.Username(), strings.TrimSpace(node.Get("limiter")))
if err != nil {
return nil, err
}
}
certFile, keyFile := node.Get("cert"), node.Get("key")
tlsCfg, err := tlsConfig(certFile, keyFile, node.Get("ca"))
if err != nil && certFile != "" && keyFile != "" {
@ -671,6 +684,7 @@ func (r *route) GenRouters() ([]router, error) {
gost.IPRoutesHandlerOption(tunRoutes...),
gost.ProxyAgentHandlerOption(node.Get("proxyAgent")),
gost.HTTPTunnelHandlerOption(node.GetBool("httpTunnel")),
gost.LimiterHandlerOption(limiterHandler),
)
rt := router{

View File

@ -44,6 +44,7 @@ type HandlerOptions struct {
IPRoutes []IPRoute
ProxyAgent string
HTTPTunnel bool
Limiter Limiter
}
// HandlerOption allows a common way to set handler options.
@ -87,6 +88,13 @@ func AuthenticatorHandlerOption(au Authenticator) HandlerOption {
}
}
// LimiterHandlerOption sets the Rate limiter option of HandlerOptions
func LimiterHandlerOption(l Limiter) HandlerOption {
return func(opts *HandlerOptions) {
opts.Limiter = l
}
}
// TLSConfigHandlerOption sets the TLSConfig option of HandlerOptions.
func TLSConfigHandlerOption(config *tls.Config) HandlerOption {
return func(opts *HandlerOptions) {

16
http.go
View File

@ -212,7 +212,23 @@ func (h *httpHandler) handleRequest(conn net.Conn, req *http.Request) {
if !h.authenticate(conn, req, resp) {
return
}
user, _, _ := basicProxyAuth(req.Header.Get("Proxy-Authorization"))
if h.options.Limiter != nil {
done, ok := h.options.Limiter.CheckRate(user, true)
if !ok {
resp.StatusCode = http.StatusTooManyRequests
if Debug {
dump, _ := httputil.DumpResponse(resp, false)
log.Logf("[http] %s <- %s rate limiter \n%s", conn.RemoteAddr(), conn.LocalAddr(), string(dump))
}
resp.Write(conn)
return
} else {
defer done()
}
}
if req.Method == "PRI" || (req.Method != http.MethodConnect && req.URL.Scheme != "http") {
resp.StatusCode = http.StatusBadRequest

View File

@ -394,7 +394,18 @@ func (h *http2Handler) roundTrip(w http.ResponseWriter, r *http.Request) {
if !h.authenticate(w, r, resp) {
return
}
user, _, _ := basicProxyAuth(r.Header.Get("Proxy-Authorization"))
if h.options.Limiter != nil {
done, ok := h.options.Limiter.CheckRate(user, true)
if !ok {
log.Logf("[http2] %s - %s rate limiter %s, user is %s",
r.RemoteAddr, laddr, host, user)
w.WriteHeader(http.StatusTooManyRequests)
return
} else {
defer done()
}
}
// delete the proxy related headers.
r.Header.Del("Proxy-Authorization")
r.Header.Del("Proxy-Connection")

259
limiter.go Normal file
View File

@ -0,0 +1,259 @@
package gost
import (
"bufio"
"errors"
"io"
"strconv"
"strings"
"sync"
"sync/atomic"
"time"
)
type Limiter interface {
CheckRate(key string, checkConcurrent bool) (func(), bool)
}
func NewLocalLimiter(user string, cfg string) (*LocalLimiter, error) {
limiter := LocalLimiter{
buckets: map[string]*limiterBucket{},
concurrent: map[string]chan bool{},
stopped: make(chan struct{}),
}
if cfg == "" || user == "" {
return &limiter, nil
}
if err := limiter.AddRule(user, cfg); err != nil {
return nil, err
}
return &limiter, nil
}
// Token Bucket
type limiterBucket struct {
max int64
cur int64
duration int64
batch int64
}
type LocalLimiter struct {
buckets map[string]*limiterBucket
concurrent map[string]chan bool
mux sync.RWMutex
stopped chan struct{}
period time.Duration
}
func (l *LocalLimiter) CheckRate(key string, checkConcurrent bool) (func(), bool) {
if checkConcurrent {
done, ok := l.checkConcurrent(key)
if !ok {
return nil, false
}
if t := l.getToken(key); !t {
done()
return nil, false
}
return done, true
} else {
if t := l.getToken(key); !t {
return nil, false
}
return nil, true
}
}
func (l *LocalLimiter) AddRule(user string, cfg string) error {
if user == "" {
return nil
}
if cfg == "" {
//reload need check old limit exists
if _, ok := l.buckets[user]; ok {
delete(l.buckets, user)
}
if _, ok := l.concurrent[user]; ok {
delete(l.concurrent, user)
}
return nil
}
args := strings.Split(cfg, ",")
if len(args) < 2 || len(args) > 3 {
return errors.New("parse limiter fail:" + cfg)
}
if len(args) == 2 {
args = append(args, "0")
}
duration, e1 := strconv.ParseInt(strings.TrimSpace(args[0]), 10, 64)
count, e2 := strconv.ParseInt(strings.TrimSpace(args[1]), 10, 64)
cur, e3 := strconv.ParseInt(strings.TrimSpace(args[2]), 10, 64)
if e1 != nil || e2 != nil || e3 != nil {
return errors.New("parse limiter fail:" + cfg)
}
// 0 means not limit
if duration > 0 && count > 0 {
bu := &limiterBucket{
cur: count * 10,
max: count * 10,
duration: duration * 100,
batch: count,
}
go func() {
for {
time.Sleep(time.Millisecond * time.Duration(bu.duration))
if bu.cur+bu.batch > bu.max {
bu.cur = bu.max
} else {
atomic.AddInt64(&bu.cur, bu.batch)
}
}
}()
l.buckets[user] = bu
} else {
if _, ok := l.buckets[user]; ok {
delete(l.buckets, user)
}
}
// zero means not limit
if cur > 0 {
l.concurrent[user] = make(chan bool, cur)
} else {
if _, ok := l.concurrent[user]; ok {
delete(l.concurrent, user)
}
}
return nil
}
// Reload parses config from r, then live reloads the LocalLimiter.
func (l *LocalLimiter) Reload(r io.Reader) error {
var period time.Duration
kvs := make(map[string]string)
if r == nil || l.Stopped() {
return nil
}
// splitLine splits a line text by white space.
// A line started with '#' will be ignored, otherwise it is valid.
split := func(line string) []string {
if line == "" {
return nil
}
line = strings.Replace(line, "\t", " ", -1)
line = strings.TrimSpace(line)
if strings.IndexByte(line, '#') == 0 {
return nil
}
var ss []string
for _, s := range strings.Split(line, " ") {
if s = strings.TrimSpace(s); s != "" {
ss = append(ss, s)
}
}
return ss
}
scanner := bufio.NewScanner(r)
for scanner.Scan() {
line := scanner.Text()
ss := split(line)
if len(ss) == 0 {
continue
}
switch ss[0] {
case "reload": // reload option
if len(ss) > 1 {
period, _ = time.ParseDuration(ss[1])
}
default:
var k, v string
k = ss[0]
if len(ss) > 2 {
v = ss[2]
}
kvs[k] = v
}
}
if err := scanner.Err(); err != nil {
return err
}
l.mux.Lock()
defer l.mux.Unlock()
l.period = period
for user, args := range kvs {
err := l.AddRule(user, args)
if err != nil {
return err
}
}
return nil
}
// Period returns the reload period.
func (l *LocalLimiter) Period() time.Duration {
if l.Stopped() {
return -1
}
l.mux.RLock()
defer l.mux.RUnlock()
return l.period
}
// Stop stops reloading.
func (l *LocalLimiter) Stop() {
select {
case <-l.stopped:
default:
close(l.stopped)
}
}
// Stopped checks whether the reloader is stopped.
func (l *LocalLimiter) Stopped() bool {
select {
case <-l.stopped:
return true
default:
return false
}
}
func (l *LocalLimiter) getToken(key string) bool {
b, ok := l.buckets[key]
if !ok || b == nil {
return true
}
if b.cur <= 0 {
return false
}
atomic.AddInt64(&b.cur, -10)
return true
}
func (l *LocalLimiter) checkConcurrent(key string) (func(), bool) {
c, ok := l.concurrent[key]
if !ok || c == nil {
return func() {}, true
}
select {
case c <- true:
return func() {
<-c
}, true
default:
return nil, false
}
}

69
limiter_test.go Normal file
View File

@ -0,0 +1,69 @@
package gost
import (
"fmt"
"testing"
)
func TestNewLocalLimiter(t *testing.T) {
items := []struct {
user string
args string
success bool
}{
{"admin", "10,1", true},
{"admin", "", true},
{"admin", "10,1,1", true},
{"admin", "10", false},
{"admin", "0,1", true},
{"admin", "0,1,1", true},
{"admin", "a,b", false},
{"", "", true},
{"", "1,2", true},
}
for i, item := range items {
item := item
t.Run(fmt.Sprintf("#%d", i), func(t *testing.T) {
_, err := NewLocalLimiter(item.user, item.args)
if (err == nil) != item.success {
t.Error("test NewLocalLimiter fail", item.user, item.args)
}
})
}
}
func TestCheckRate(t *testing.T) {
items := []struct {
user string
args string
testUser string
checkCount int
shouldSuccessCount int
}{
{"admin", "10,3", "admin", 10, 3},
{"admin", "10,3,0", "admin", 10, 3},
{"admin", "10,3,2", "admin", 10, 2},
{"admin", "0,0", "admin", 10, 10},
{"admin", "10,3,5", "admin", 10, 3},
{"admin", "10,3,5", "admin22", 10, 10},
{"admin", "0,0,5", "admin", 10, 5},
}
for i, item := range items {
item := item
t.Run(fmt.Sprintf("#%d", i), func(t *testing.T) {
l, err := NewLocalLimiter(item.user, item.args)
if err != nil {
t.Error("test NewLocalLimiter fail", item.user, item.args)
}
successCount := 0
for j := 0; j < item.checkCount; j++ {
if _, ok := l.CheckRate(item.testUser, true); ok {
successCount++
}
}
if successCount != item.shouldSuccessCount {
t.Error("test localLimiter fail", item)
}
})
}
}

View File

@ -171,6 +171,17 @@ func (h *relayHandler) Handle(conn net.Conn) {
log.Logf("[relay] %s -> %s : %s unauthorized", conn.RemoteAddr(), conn.LocalAddr(), user)
return
}
if h.options.Limiter != nil {
done, ok := h.options.Limiter.CheckRate(user, true)
if !ok {
resp.Status = relay.StatusForbidden
resp.WriteTo(conn)
log.Logf("[relay] %s -> %s : %s rate limiter", conn.RemoteAddr(), conn.LocalAddr(), user)
return
} else {
defer done()
}
}
if raddr != "" {
if len(h.group.Nodes()) > 0 {

View File

@ -112,6 +112,7 @@ type serverSelector struct {
// Users []*url.Userinfo
Authenticator Authenticator
TLSConfig *tls.Config
Limiter Limiter
}
func (selector *serverSelector) Methods() []uint8 {
@ -181,7 +182,14 @@ func (selector *serverSelector) OnSelected(method uint8, conn net.Conn) (net.Con
log.Logf("[socks5] %s - %s: proxy authentication required", conn.RemoteAddr(), conn.LocalAddr())
return nil, gosocks5.ErrAuthFailure
}
if req.Username != "" && selector.Limiter != nil {
if _, ok := selector.Limiter.CheckRate(req.Username, false); !ok {
if Debug {
log.Logf("[http] %s <- %s rate limiter \n%s", conn.RemoteAddr(), conn.LocalAddr(), req.Username)
}
return nil, errors.New("rate limiter check fail")
}
}
resp := gosocks5.NewUserPassResponse(gosocks5.UserPassVer, gosocks5.Succeeded)
if err := resp.Write(conn); err != nil {
log.Logf("[socks5] %s - %s: %s", conn.RemoteAddr(), conn.LocalAddr(), err)
@ -836,6 +844,7 @@ func (h *socks5Handler) Init(options ...HandlerOption) {
// Users: h.options.Users,
Authenticator: h.options.Authenticator,
TLSConfig: tlsConfig,
Limiter: h.options.Limiter,
}
// methods that socks5 server supported
h.selector.AddMethod(