Compare commits

...
This repository has been archived on 2022-10-07. You can view files and clone it, but cannot push or open issues or pull requests.

7 Commits

Author SHA1 Message Date
Ivaylo Novakov 93aca03b2a
Revert "Try to fix nginx"
This reverts commit 03fecc8cd1.
2021-12-08 19:05:02 +01:00
Ivaylo Novakov abfbc74241
Try to fix nginx 2021-12-08 18:56:57 +01:00
Ivaylo Novakov 03fecc8cd1
Try to fix nginx 2021-12-08 18:51:18 +01:00
Ivaylo Novakov 82e85f829f
Download rate limit to 20rps. 2021-12-08 18:09:53 +01:00
Ivaylo Novakov cae76b2d53
Download rate limit to 10rps. 2021-12-08 18:08:14 +01:00
Ivaylo Novakov b67b4b4335
Download rate limit to 3rps. 2021-12-08 18:04:32 +01:00
Ivaylo Novakov 25af756a14
Add download rate limits. 2021-12-08 18:00:46 +01:00
3 changed files with 36 additions and 12 deletions

View File

@ -9,7 +9,7 @@ if ($request_method = PURGE) {
return 462;
}
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
limit_conn downloads_by_ip 20; # ddos protection: max 100 downloads at a time
# ensure that skylink that we pass around is base64 encoded (transform base32 encoded ones)
# this is important because we want only one format in cache keys and logs
@ -17,13 +17,13 @@ set_by_lua_block $skylink { return require("skynet.skylink").parse(ngx.var.skyli
# $skylink_v1 and $skylink_v2 variables default to the same value but in case the requested skylink was:
# a) skylink v1 - it would not matter, no additional logic is executed
# b) skylink v2 - in a lua block below we will resolve the skylink v2 into skylink v1 and update
# $skylink_v1 variable so then the proxy request to skyd can be cached in nginx (proxy_cache_key
# b) skylink v2 - in a lua block below we will resolve the skylink v2 into skylink v1 and update
# $skylink_v1 variable so then the proxy request to skyd can be cached in nginx (proxy_cache_key
# in proxy-cache-downloads includes $skylink_v1 as a part of the cache key)
set $skylink_v1 $skylink;
set $skylink_v2 $skylink;
# variable for Skynet-Proof header that we need to inject
# variable for Skynet-Proof header that we need to inject
# into a response if the request was for skylink v2
set $skynet_proof '';
@ -36,7 +36,7 @@ access_by_lua_block {
-- detect whether requested skylink is v2
local isBase32v2 = string.len(ngx.var.skylink) == 55 and string.sub(ngx.var.skylink, 0, 2) == "04"
local isBase64v2 = string.len(ngx.var.skylink) == 46 and string.sub(ngx.var.skylink, 0, 2) == "AQ"
if isBase32v2 or isBase64v2 then
-- 10.10.10.10 points to sia service (alias not available when using resty-http)
local res, err = httpc:request_uri("http://10.10.10.10:9980/skynet/resolve/" .. ngx.var.skylink_v2, {
@ -64,7 +64,7 @@ access_by_lua_block {
local res, err = httpc:request_uri("http://10.10.10.70:3000/user/limits", {
headers = { ["Cookie"] = "skynet-jwt=" .. ngx.var.skynet_jwt }
})
-- fail gracefully in case /user/limits failed
if err or (res and res.status ~= ngx.HTTP_OK) then
ngx.log(ngx.ERR, "Failed accounts service request /user/limits: ", err or ("[HTTP " .. res.status .. "] " .. res.body))
@ -95,8 +95,8 @@ limit_rate $limit_rate;
proxy_read_timeout 600;
proxy_set_header User-Agent: Sia-Agent;
# in case the requested skylink was v2 and we already resolved it to skylink v1, we are going to pass resolved
# skylink v1 to skyd to save that extra skylink v2 lookup in skyd but in turn, in case skyd returns a redirect
# in case the requested skylink was v2 and we already resolved it to skylink v1, we are going to pass resolved
# skylink v1 to skyd to save that extra skylink v2 lookup in skyd but in turn, in case skyd returns a redirect
# we need to rewrite the skylink v1 to skylink v2 in the location header with proxy_redirect
proxy_redirect $skylink_v1 $skylink_v2;
proxy_pass http://sia:9980/skynet/skylink/$skylink_v1$path$is_args$args;

View File

@ -76,7 +76,7 @@ location /serverload {
# Define root directory in the nginx container to load file from
root /usr/local/share;
# including this because of peer pressure from the other routes
# including this because of peer pressure from the other routes
include /etc/nginx/conf.d/include/cors;
# tell nginx to expect json
@ -177,9 +177,15 @@ location /skynet/skyfile {
limit_req zone=uploads_by_ip burst=10 nodelay;
limit_req zone=uploads_by_ip_throttled;
limit_req zone=downloads_by_ip burst=20 nodelay;
limit_req zone=downloads_by_ip_throttled;
limit_conn upload_conn 5;
limit_conn upload_conn_rl 1;
limit_conn download_conn 20;
limit_conn download_conn_rl 1;
client_max_body_size 1000M; # make sure to limit the size of upload to a sane value
# increase request timeouts
@ -215,9 +221,15 @@ location /skynet/tus {
limit_req zone=uploads_by_ip burst=10 nodelay;
limit_req zone=uploads_by_ip_throttled;
limit_conn upload_conn 5;
limit_req zone=downloads_by_ip burst=20 nodelay;
limit_req zone=downloads_by_ip_throttled;
limit_conn upload_conn 3;
limit_conn upload_conn_rl 1;
limit_conn download_conn 20;
limit_conn download_conn_rl 1;
# TUS chunks size is 40M + leaving 10M of breathing room
client_max_body_size 50M;
@ -286,9 +298,15 @@ location /skynet/pin {
limit_req zone=uploads_by_ip burst=10 nodelay;
limit_req zone=uploads_by_ip_throttled;
limit_conn upload_conn 5;
limit_req zone=downloads_by_ip burst=20 nodelay;
limit_req zone=downloads_by_ip_throttled;
limit_conn upload_conn 3;
limit_conn upload_conn_rl 1;
limit_conn download_conn 20;
limit_conn download_conn_rl 1;
proxy_set_header User-Agent: Sia-Agent;
proxy_pass http://sia:9980$uri?siapath=$dir1/$dir2/$dir3&$args;
}

View File

@ -73,7 +73,7 @@ http {
proxy_cache_path /data/nginx/cache levels=1:2 keys_zone=skynet:10m max_size=50g min_free=100g inactive=48h use_temp_path=off;
# this runs before forking out nginx worker processes
init_by_lua_block {
init_by_lua_block {
require "cjson"
require "resty.http"
require "skynet.skylink"
@ -99,12 +99,18 @@ http {
limit_req_zone $binary_remote_addr zone=uploads_by_ip:10m rate=10r/s;
limit_req_zone $limit_key zone=uploads_by_ip_throttled:10m rate=10r/m;
limit_req_zone $binary_remote_addr zone=downloads_by_ip:10m rate=20r/s;
limit_req_zone $limit_key zone=downloads_by_ip_throttled:10m rate=20r/m;
limit_req_zone $binary_remote_addr zone=registry_access_by_ip:10m rate=60r/m;
limit_req_zone $limit_key zone=registry_access_by_ip_throttled:10m rate=20r/m;
limit_conn_zone $binary_remote_addr zone=upload_conn:10m;
limit_conn_zone $limit_key zone=upload_conn_rl:10m;
limit_conn_zone $binary_remote_addr zone=download_conn:10m;
limit_conn_zone $limit_key zone=download_conn_rl:10m;
limit_conn_zone $binary_remote_addr zone=downloads_by_ip:10m;
limit_req_status 429;