mirror of
https://github.com/status-im/status-go.git
synced 2025-01-10 14:47:06 +00:00
c5577418b7
Why make this change? Currently we only rate limit by number of messages. This works well if we want to limit a large amount of small messages but breaks down if sending a smaller amount of large messages. This commit extends the current code to limit by size as well, setting the default to 1MB per second, which should be enough. What has changed? - Rate limiter for waku only
592 lines
18 KiB
Go
592 lines
18 KiB
Go
// +build !nimbus
|
|
|
|
package node
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"github.com/syndtr/goleveldb/leveldb"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts"
|
|
"github.com/ethereum/go-ethereum/core"
|
|
"github.com/ethereum/go-ethereum/eth"
|
|
"github.com/ethereum/go-ethereum/eth/downloader"
|
|
"github.com/ethereum/go-ethereum/les"
|
|
"github.com/ethereum/go-ethereum/log"
|
|
"github.com/ethereum/go-ethereum/node"
|
|
"github.com/ethereum/go-ethereum/p2p"
|
|
"github.com/ethereum/go-ethereum/p2p/discv5"
|
|
"github.com/ethereum/go-ethereum/p2p/enode"
|
|
"github.com/ethereum/go-ethereum/p2p/nat"
|
|
|
|
gethbridge "github.com/status-im/status-go/eth-node/bridge/geth"
|
|
"github.com/status-im/status-go/eth-node/crypto"
|
|
"github.com/status-im/status-go/logutils"
|
|
"github.com/status-im/status-go/mailserver"
|
|
"github.com/status-im/status-go/params"
|
|
"github.com/status-im/status-go/services/ext"
|
|
"github.com/status-im/status-go/services/nodebridge"
|
|
"github.com/status-im/status-go/services/peer"
|
|
"github.com/status-im/status-go/services/personal"
|
|
"github.com/status-im/status-go/services/shhext"
|
|
"github.com/status-im/status-go/services/status"
|
|
"github.com/status-im/status-go/services/wakuext"
|
|
"github.com/status-im/status-go/static"
|
|
"github.com/status-im/status-go/timesource"
|
|
"github.com/status-im/status-go/waku"
|
|
wakucommon "github.com/status-im/status-go/waku/common"
|
|
"github.com/status-im/status-go/whisper/v6"
|
|
)
|
|
|
|
// Errors related to node and services creation.
|
|
var (
|
|
ErrNodeMakeFailureFormat = "error creating p2p node: %s"
|
|
ErrWhisperServiceRegistrationFailure = errors.New("failed to register the Whisper service")
|
|
ErrWakuServiceRegistrationFailure = errors.New("failed to register the Waku service")
|
|
ErrLightEthRegistrationFailure = errors.New("failed to register the LES service")
|
|
ErrLightEthRegistrationFailureUpstreamEnabled = errors.New("failed to register the LES service, upstream is also configured")
|
|
ErrPersonalServiceRegistrationFailure = errors.New("failed to register the personal api service")
|
|
ErrStatusServiceRegistrationFailure = errors.New("failed to register the Status service")
|
|
ErrPeerServiceRegistrationFailure = errors.New("failed to register the Peer service")
|
|
)
|
|
|
|
// All general log messages in this package should be routed through this logger.
|
|
var logger = log.New("package", "status-go/node")
|
|
|
|
// MakeNode creates a geth node entity
|
|
func MakeNode(config *params.NodeConfig, accs *accounts.Manager, db *leveldb.DB) (*node.Node, error) {
|
|
// If DataDir is empty, it means we want to create an ephemeral node
|
|
// keeping data only in memory.
|
|
if config.DataDir != "" {
|
|
// make sure data directory exists
|
|
if err := os.MkdirAll(filepath.Clean(config.DataDir), os.ModePerm); err != nil {
|
|
return nil, fmt.Errorf("make node: make data directory: %v", err)
|
|
}
|
|
|
|
// make sure keys directory exists
|
|
if err := os.MkdirAll(filepath.Clean(config.KeyStoreDir), os.ModePerm); err != nil {
|
|
return nil, fmt.Errorf("make node: make keys directory: %v", err)
|
|
}
|
|
}
|
|
|
|
stackConfig, err := newGethNodeConfig(config)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
stack, err := node.New(stackConfig)
|
|
if err != nil {
|
|
return nil, fmt.Errorf(ErrNodeMakeFailureFormat, err.Error())
|
|
}
|
|
|
|
err = activateServices(stack, config, accs, db)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return stack, nil
|
|
}
|
|
|
|
func activateServices(stack *node.Node, config *params.NodeConfig, accs *accounts.Manager, db *leveldb.DB) error {
|
|
if config.EnableNTPSync {
|
|
err := stack.Register(func(*node.ServiceContext) (node.Service, error) {
|
|
return timesource.Default(), nil
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("failed to register NTP time source: %v", err)
|
|
}
|
|
}
|
|
|
|
// start Ethereum service if we are not expected to use an upstream server
|
|
if !config.UpstreamConfig.Enabled {
|
|
if err := activateLightEthService(stack, accs, config); err != nil {
|
|
return fmt.Errorf("%v: %v", ErrLightEthRegistrationFailure, err)
|
|
}
|
|
} else {
|
|
if config.LightEthConfig.Enabled {
|
|
return ErrLightEthRegistrationFailureUpstreamEnabled
|
|
}
|
|
|
|
logger.Info("LES protocol is disabled")
|
|
|
|
// `personal_sign` and `personal_ecRecover` methods are important to
|
|
// keep DApps working.
|
|
// Usually, they are provided by an ETH or a LES service, but when using
|
|
// upstream, we don't start any of these, so we need to start our own
|
|
// implementation.
|
|
if err := activatePersonalService(stack, accs, config); err != nil {
|
|
return fmt.Errorf("%v: %v", ErrPersonalServiceRegistrationFailure, err)
|
|
}
|
|
}
|
|
|
|
if err := activateNodeServices(stack, config, db); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func activateNodeServices(stack *node.Node, config *params.NodeConfig, db *leveldb.DB) error {
|
|
// Register eth-node node bridge
|
|
err := stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
return &nodebridge.NodeService{Node: gethbridge.NewNodeBridge(stack)}, nil
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("failed to register NodeBridge: %v", err)
|
|
}
|
|
|
|
// start Whisper service.
|
|
if err := activateShhService(stack, config, db); err != nil {
|
|
return fmt.Errorf("%v: %v", ErrWhisperServiceRegistrationFailure, err)
|
|
}
|
|
|
|
// start Waku service
|
|
if err := activateWakuService(stack, config, db); err != nil {
|
|
return fmt.Errorf("%v: %v", ErrWakuServiceRegistrationFailure, err)
|
|
}
|
|
|
|
// start status service.
|
|
if err := activateStatusService(stack, config); err != nil {
|
|
return fmt.Errorf("%v: %v", ErrStatusServiceRegistrationFailure, err)
|
|
}
|
|
|
|
// start peer service
|
|
if err := activatePeerService(stack); err != nil {
|
|
return fmt.Errorf("%v: %v", ErrPeerServiceRegistrationFailure, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// newGethNodeConfig returns default stack configuration for mobile client node
|
|
func newGethNodeConfig(config *params.NodeConfig) (*node.Config, error) {
|
|
nc := &node.Config{
|
|
DataDir: config.DataDir,
|
|
KeyStoreDir: config.KeyStoreDir,
|
|
UseLightweightKDF: true,
|
|
NoUSB: true,
|
|
Name: config.Name,
|
|
Version: config.Version,
|
|
P2P: p2p.Config{
|
|
NoDiscovery: true, // we always use only v5 server
|
|
ListenAddr: config.ListenAddr,
|
|
NAT: nat.Any(),
|
|
MaxPeers: config.MaxPeers,
|
|
MaxPendingPeers: config.MaxPendingPeers,
|
|
},
|
|
HTTPModules: config.FormatAPIModules(),
|
|
}
|
|
|
|
if config.IPCEnabled {
|
|
// use well-known defaults
|
|
if config.IPCFile == "" {
|
|
config.IPCFile = "geth.ipc"
|
|
}
|
|
|
|
nc.IPCPath = config.IPCFile
|
|
}
|
|
|
|
if config.HTTPEnabled {
|
|
nc.HTTPHost = config.HTTPHost
|
|
nc.HTTPPort = config.HTTPPort
|
|
nc.HTTPVirtualHosts = config.HTTPVirtualHosts
|
|
nc.HTTPCors = config.HTTPCors
|
|
}
|
|
|
|
if config.ClusterConfig.Enabled {
|
|
nc.P2P.BootstrapNodesV5 = parseNodesV5(config.ClusterConfig.BootNodes)
|
|
nc.P2P.StaticNodes = parseNodes(config.ClusterConfig.StaticNodes)
|
|
}
|
|
|
|
if config.NodeKey != "" {
|
|
sk, err := crypto.HexToECDSA(config.NodeKey)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// override node's private key
|
|
nc.P2P.PrivateKey = sk
|
|
}
|
|
|
|
return nc, nil
|
|
}
|
|
|
|
// calculateGenesis retrieves genesis value for given network
|
|
func calculateGenesis(networkID uint64) (*core.Genesis, error) {
|
|
var genesis *core.Genesis
|
|
|
|
switch networkID {
|
|
case params.MainNetworkID:
|
|
genesis = core.DefaultGenesisBlock()
|
|
case params.RopstenNetworkID:
|
|
genesis = core.DefaultTestnetGenesisBlock()
|
|
case params.RinkebyNetworkID:
|
|
genesis = core.DefaultRinkebyGenesisBlock()
|
|
case params.GoerliNetworkID:
|
|
genesis = core.DefaultGoerliGenesisBlock()
|
|
case params.StatusChainNetworkID:
|
|
var err error
|
|
if genesis, err = defaultStatusChainGenesisBlock(); err != nil {
|
|
return nil, err
|
|
}
|
|
default:
|
|
return nil, nil
|
|
}
|
|
|
|
return genesis, nil
|
|
}
|
|
|
|
// defaultStatusChainGenesisBlock returns the StatusChain network genesis block.
|
|
func defaultStatusChainGenesisBlock() (*core.Genesis, error) {
|
|
genesisJSON, err := static.ConfigStatusChainGenesisJsonBytes()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("status-chain-genesis.json could not be loaded: %s", err)
|
|
}
|
|
|
|
var genesis *core.Genesis
|
|
err = json.Unmarshal(genesisJSON, &genesis)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("cannot unmarshal status-chain-genesis.json: %s", err)
|
|
}
|
|
return genesis, nil
|
|
}
|
|
|
|
// activateLightEthService configures and registers the eth.Ethereum service with a given node.
|
|
func activateLightEthService(stack *node.Node, accs *accounts.Manager, config *params.NodeConfig) error {
|
|
if !config.LightEthConfig.Enabled {
|
|
logger.Info("LES protocol is disabled")
|
|
return nil
|
|
}
|
|
|
|
genesis, err := calculateGenesis(config.NetworkID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ethConf := eth.DefaultConfig
|
|
ethConf.Genesis = genesis
|
|
ethConf.SyncMode = downloader.LightSync
|
|
ethConf.NetworkId = config.NetworkID
|
|
ethConf.DatabaseCache = config.LightEthConfig.DatabaseCache
|
|
return stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
// NOTE(dshulyak) here we set our instance of the accounts manager.
|
|
// without sharing same instance selected account won't be visible for personal_* methods.
|
|
nctx := &node.ServiceContext{}
|
|
*nctx = *ctx
|
|
nctx.AccountManager = accs
|
|
return les.New(nctx, ðConf)
|
|
})
|
|
}
|
|
|
|
func activatePersonalService(stack *node.Node, accs *accounts.Manager, config *params.NodeConfig) error {
|
|
return stack.Register(func(*node.ServiceContext) (node.Service, error) {
|
|
svc := personal.New(accs)
|
|
return svc, nil
|
|
})
|
|
}
|
|
|
|
func activateStatusService(stack *node.Node, config *params.NodeConfig) error {
|
|
if !config.EnableStatusService {
|
|
logger.Info("Status service api is disabled")
|
|
return nil
|
|
}
|
|
|
|
return stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
var service *nodebridge.WhisperService
|
|
if err := ctx.Service(&service); err != nil {
|
|
return nil, err
|
|
}
|
|
svc := status.New(service.Whisper)
|
|
return svc, nil
|
|
})
|
|
}
|
|
|
|
func activatePeerService(stack *node.Node) error {
|
|
return stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
svc := peer.New()
|
|
return svc, nil
|
|
})
|
|
}
|
|
|
|
func registerWhisperMailServer(whisperService *whisper.Whisper, config *params.WhisperConfig) (err error) {
|
|
var mailServer mailserver.WhisperMailServer
|
|
whisperService.RegisterMailServer(&mailServer)
|
|
|
|
return mailServer.Init(whisperService, config)
|
|
}
|
|
|
|
func registerWakuMailServer(wakuService *waku.Waku, config *params.WakuConfig) (err error) {
|
|
var mailServer mailserver.WakuMailServer
|
|
wakuService.RegisterMailServer(&mailServer)
|
|
|
|
return mailServer.Init(wakuService, config)
|
|
}
|
|
|
|
// activateShhService configures Whisper and adds it to the given node.
|
|
func activateShhService(stack *node.Node, config *params.NodeConfig, db *leveldb.DB) (err error) {
|
|
if !config.WhisperConfig.Enabled {
|
|
logger.Info("SHH protocol is disabled")
|
|
return nil
|
|
}
|
|
|
|
err = stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
return createShhService(ctx, &config.WhisperConfig, &config.ClusterConfig)
|
|
})
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
// Register Whisper eth-node bridge
|
|
err = stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
var ethnode *nodebridge.NodeService
|
|
if err := ctx.Service(ðnode); err != nil {
|
|
return nil, err
|
|
}
|
|
w, err := ethnode.Node.GetWhisper(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &nodebridge.WhisperService{Whisper: w}, nil
|
|
})
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
// TODO(dshulyak) add a config option to enable it by default, but disable if app is started from statusd
|
|
return stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
var ethnode *nodebridge.NodeService
|
|
if err := ctx.Service(ðnode); err != nil {
|
|
return nil, err
|
|
}
|
|
return shhext.New(config.ShhextConfig, ethnode.Node, ctx, ext.EnvelopeSignalHandler{}, db), nil
|
|
})
|
|
}
|
|
|
|
// activateWakuService configures Waku and adds it to the given node.
|
|
func activateWakuService(stack *node.Node, config *params.NodeConfig, db *leveldb.DB) (err error) {
|
|
if !config.WakuConfig.Enabled {
|
|
logger.Info("Waku protocol is disabled")
|
|
return nil
|
|
}
|
|
|
|
err = stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
return createWakuService(ctx, &config.WakuConfig, &config.ClusterConfig)
|
|
})
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
// Register Whisper eth-node bridge
|
|
err = stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
var ethnode *nodebridge.NodeService
|
|
if err := ctx.Service(ðnode); err != nil {
|
|
return nil, err
|
|
}
|
|
w, err := ethnode.Node.GetWaku(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &nodebridge.WakuService{Waku: w}, nil
|
|
})
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
// TODO(dshulyak) add a config option to enable it by default, but disable if app is started from statusd
|
|
return stack.Register(func(ctx *node.ServiceContext) (node.Service, error) {
|
|
var ethnode *nodebridge.NodeService
|
|
if err := ctx.Service(ðnode); err != nil {
|
|
return nil, err
|
|
}
|
|
return wakuext.New(config.ShhextConfig, ethnode.Node, ctx, ext.EnvelopeSignalHandler{}, db), nil
|
|
})
|
|
}
|
|
|
|
func createShhService(ctx *node.ServiceContext, whisperConfig *params.WhisperConfig, clusterConfig *params.ClusterConfig) (*whisper.Whisper, error) {
|
|
whisperServiceConfig := &whisper.Config{
|
|
MaxMessageSize: whisper.DefaultMaxMessageSize,
|
|
MinimumAcceptedPOW: params.WhisperMinimumPoW,
|
|
}
|
|
|
|
if whisperConfig.MaxMessageSize > 0 {
|
|
whisperServiceConfig.MaxMessageSize = whisperConfig.MaxMessageSize
|
|
}
|
|
if whisperConfig.MinimumPoW > 0 {
|
|
whisperServiceConfig.MinimumAcceptedPOW = whisperConfig.MinimumPoW
|
|
}
|
|
|
|
whisperService := whisper.New(whisperServiceConfig)
|
|
|
|
if whisperConfig.EnableRateLimiter {
|
|
r := whisperRateLimiter(whisperConfig, clusterConfig)
|
|
whisperService.SetRateLimiter(r)
|
|
}
|
|
|
|
if timesource, err := timeSource(ctx); err == nil {
|
|
whisperService.SetTimeSource(timesource)
|
|
}
|
|
|
|
// enable mail service
|
|
if whisperConfig.EnableMailServer {
|
|
if err := registerWhisperMailServer(whisperService, whisperConfig); err != nil {
|
|
return nil, fmt.Errorf("failed to register MailServer: %v", err)
|
|
}
|
|
}
|
|
|
|
if whisperConfig.LightClient {
|
|
emptyBloomFilter := make([]byte, 64)
|
|
if err := whisperService.SetBloomFilter(emptyBloomFilter); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
return whisperService, nil
|
|
}
|
|
|
|
func createWakuService(ctx *node.ServiceContext, wakuCfg *params.WakuConfig, clusterCfg *params.ClusterConfig) (*waku.Waku, error) {
|
|
cfg := &waku.Config{
|
|
MaxMessageSize: wakucommon.DefaultMaxMessageSize,
|
|
BloomFilterMode: wakuCfg.BloomFilterMode,
|
|
MinimumAcceptedPoW: params.WakuMinimumPoW,
|
|
}
|
|
|
|
if wakuCfg.MaxMessageSize > 0 {
|
|
cfg.MaxMessageSize = wakuCfg.MaxMessageSize
|
|
}
|
|
if wakuCfg.MinimumPoW > 0 {
|
|
cfg.MinimumAcceptedPoW = wakuCfg.MinimumPoW
|
|
}
|
|
|
|
w := waku.New(cfg, logutils.ZapLogger())
|
|
|
|
if wakuCfg.EnableRateLimiter {
|
|
r := wakuRateLimiter(wakuCfg, clusterCfg)
|
|
w.RegisterRateLimiter(r)
|
|
}
|
|
|
|
if timesource, err := timeSource(ctx); err == nil {
|
|
w.SetTimeSource(timesource)
|
|
}
|
|
|
|
// enable mail service
|
|
if wakuCfg.EnableMailServer {
|
|
if err := registerWakuMailServer(w, wakuCfg); err != nil {
|
|
return nil, fmt.Errorf("failed to register WakuMailServer: %v", err)
|
|
}
|
|
}
|
|
|
|
if wakuCfg.LightClient {
|
|
emptyBloomFilter := make([]byte, 64)
|
|
if err := w.SetBloomFilter(emptyBloomFilter); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
return w, nil
|
|
}
|
|
|
|
// parseNodes creates list of enode.Node out of enode strings.
|
|
func parseNodes(enodes []string) []*enode.Node {
|
|
var nodes []*enode.Node
|
|
for _, item := range enodes {
|
|
parsedPeer, err := enode.ParseV4(item)
|
|
if err == nil {
|
|
nodes = append(nodes, parsedPeer)
|
|
} else {
|
|
logger.Error("Failed to parse enode", "enode", item, "err", err)
|
|
}
|
|
|
|
}
|
|
return nodes
|
|
}
|
|
|
|
// parseNodesV5 creates list of discv5.Node out of enode strings.
|
|
func parseNodesV5(enodes []string) []*discv5.Node {
|
|
var nodes []*discv5.Node
|
|
for _, enode := range enodes {
|
|
parsedPeer, err := discv5.ParseNode(enode)
|
|
|
|
if err == nil {
|
|
nodes = append(nodes, parsedPeer)
|
|
} else {
|
|
logger.Error("Failed to parse enode", "enode", enode, "err", err)
|
|
}
|
|
}
|
|
return nodes
|
|
}
|
|
|
|
func parseNodesToNodeID(enodes []string) []enode.ID {
|
|
nodeIDs := make([]enode.ID, 0, len(enodes))
|
|
for _, node := range parseNodes(enodes) {
|
|
nodeIDs = append(nodeIDs, node.ID())
|
|
}
|
|
return nodeIDs
|
|
}
|
|
|
|
// timeSource get timeSource to be used by whisper
|
|
func timeSource(ctx *node.ServiceContext) (func() time.Time, error) {
|
|
var timeSource *timesource.NTPTimeSource
|
|
if err := ctx.Service(&timeSource); err != nil {
|
|
return nil, err
|
|
}
|
|
return timeSource.Now, nil
|
|
}
|
|
|
|
func whisperRateLimiter(whisperConfig *params.WhisperConfig, clusterConfig *params.ClusterConfig) *whisper.PeerRateLimiter {
|
|
enodes := append(
|
|
parseNodes(clusterConfig.StaticNodes),
|
|
parseNodes(clusterConfig.TrustedMailServers)...,
|
|
)
|
|
var (
|
|
ips []string
|
|
peerIDs []enode.ID
|
|
)
|
|
for _, item := range enodes {
|
|
ips = append(ips, item.IP().String())
|
|
peerIDs = append(peerIDs, item.ID())
|
|
}
|
|
return whisper.NewPeerRateLimiter(
|
|
&whisper.PeerRateLimiterConfig{
|
|
LimitPerSecIP: whisperConfig.RateLimitIP,
|
|
LimitPerSecPeerID: whisperConfig.RateLimitPeerID,
|
|
WhitelistedIPs: ips,
|
|
WhitelistedPeerIDs: peerIDs,
|
|
},
|
|
&whisper.MetricsRateLimiterHandler{},
|
|
&whisper.DropPeerRateLimiterHandler{
|
|
Tolerance: whisperConfig.RateLimitTolerance,
|
|
},
|
|
)
|
|
}
|
|
|
|
func wakuRateLimiter(wakuCfg *params.WakuConfig, clusterCfg *params.ClusterConfig) *wakucommon.PeerRateLimiter {
|
|
enodes := append(
|
|
parseNodes(clusterCfg.StaticNodes),
|
|
parseNodes(clusterCfg.TrustedMailServers)...,
|
|
)
|
|
var (
|
|
ips []string
|
|
peerIDs []enode.ID
|
|
)
|
|
for _, item := range enodes {
|
|
ips = append(ips, item.IP().String())
|
|
peerIDs = append(peerIDs, item.ID())
|
|
}
|
|
return wakucommon.NewPeerRateLimiter(
|
|
&wakucommon.PeerRateLimiterConfig{
|
|
PacketLimitPerSecIP: wakuCfg.PacketRateLimitIP,
|
|
PacketLimitPerSecPeerID: wakuCfg.PacketRateLimitPeerID,
|
|
BytesLimitPerSecIP: wakuCfg.BytesRateLimitIP,
|
|
BytesLimitPerSecPeerID: wakuCfg.BytesRateLimitPeerID,
|
|
WhitelistedIPs: ips,
|
|
WhitelistedPeerIDs: peerIDs,
|
|
},
|
|
&whisper.MetricsRateLimiterHandler{},
|
|
&whisper.DropPeerRateLimiterHandler{
|
|
Tolerance: wakuCfg.RateLimitTolerance,
|
|
},
|
|
)
|
|
}
|