Skip to content

Commit fe684c2

Browse files
feat(iroh-dns-server)!: Make http rate limit configurable (#2772)
Hello, We are currently testing some new cloud features at [Spacedrive](https://github.com/spacedriveapp/spacedrive), and our implementation relies heavily on iroh. As part of this, we are deploying our own iroh-dns-server. However, since all of our backend services operate behind a reverse proxy, we noticed that the iroh-dns-server was frequently hitting its rate limit because it wasn’t aware of the proxy setup. To address this, I decided to implement a configurable rate limit for the iroh-dns-server. ## Description This PR adds a new entry to the `iroh-dns-server` TOML file for configuring the HTTP rate limit. The new configuration allows for disabling the rate limit and also supports configuring it to use the [SmartIPKeyExtract](https://github.com/benwis/tower-governor/blob/v0.4.2/src/key_extractor.rs#L85-L119), making it compatible with reverse proxies. ## Breaking Changes - `iroh-dns-server`'s configuration structure now has a new field allowing to choose the rate limiting algorithms. ## Notes & open questions :) ## Change checklist - [x] Self-review. - [x] Documentation updates following the [style guide](https://rust-lang.github.io/rfcs/1574-more-api-documentation-conventions.html#appendix-a-full-conventions-text), if relevant. - [x] Tests if relevant. - [x] All breaking changes documented.
1 parent 61acd96 commit fe684c2

File tree

6 files changed

+78
-15
lines changed

6 files changed

+78
-15
lines changed

iroh-dns-server/config.dev.toml

+2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
pkarr_put_rate_limit = "disabled"
2+
13
[http]
24
port = 8080
35
bind_addr = "127.0.0.1"

iroh-dns-server/config.prod.toml

+2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
pkarr_put_rate_limit = "smart"
2+
13
[https]
24
port = 443
35
domains = ["irohdns.example.org"]

iroh-dns-server/src/config.rs

+6-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ use tracing::info;
1212

1313
use crate::{
1414
dns::DnsConfig,
15-
http::{CertMode, HttpConfig, HttpsConfig},
15+
http::{CertMode, HttpConfig, HttpsConfig, RateLimitConfig},
1616
};
1717

1818
const DEFAULT_METRICS_ADDR: SocketAddr = SocketAddr::new(IpAddr::V4(Ipv4Addr::LOCALHOST), 9117);
@@ -43,6 +43,10 @@ pub struct Config {
4343

4444
/// Config for the mainline lookup.
4545
pub mainline: Option<MainlineConfig>,
46+
47+
/// Config for pkarr rate limit
48+
#[serde(default)]
49+
pub pkarr_put_rate_limit: RateLimitConfig,
4650
}
4751

4852
/// The config for the metrics server.
@@ -185,6 +189,7 @@ impl Default for Config {
185189
},
186190
metrics: None,
187191
mainline: None,
192+
pkarr_put_rate_limit: RateLimitConfig::default(),
188193
}
189194
}
190195
}

iroh-dns-server/src/http.rs

+10-5
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ mod pkarr;
3030
mod rate_limiting;
3131
mod tls;
3232

33-
pub use self::tls::CertMode;
33+
pub use self::{rate_limiting::RateLimitConfig, tls::CertMode};
3434
use crate::{config::Config, metrics::Metrics, state::AppState};
3535

3636
/// Config for the HTTP server
@@ -71,13 +71,14 @@ impl HttpServer {
7171
pub async fn spawn(
7272
http_config: Option<HttpConfig>,
7373
https_config: Option<HttpsConfig>,
74+
rate_limit_config: RateLimitConfig,
7475
state: AppState,
7576
) -> Result<HttpServer> {
7677
if http_config.is_none() && https_config.is_none() {
7778
bail!("Either http or https config is required");
7879
}
7980

80-
let app = create_app(state);
81+
let app = create_app(state, &rate_limit_config);
8182

8283
let mut tasks = JoinSet::new();
8384

@@ -184,7 +185,7 @@ impl HttpServer {
184185
}
185186
}
186187

187-
pub(crate) fn create_app(state: AppState) -> Router {
188+
pub(crate) fn create_app(state: AppState, rate_limit_config: &RateLimitConfig) -> Router {
188189
// configure cors middleware
189190
let cors = CorsLayer::new()
190191
// allow `GET` and `POST` when accessing the resource
@@ -209,7 +210,7 @@ pub(crate) fn create_app(state: AppState) -> Router {
209210
});
210211

211212
// configure rate limiting middleware
212-
let rate_limit = rate_limiting::create();
213+
let rate_limit = rate_limiting::create(rate_limit_config);
213214

214215
// configure routes
215216
//
@@ -218,7 +219,11 @@ pub(crate) fn create_app(state: AppState) -> Router {
218219
.route("/dns-query", get(doh::get).post(doh::post))
219220
.route(
220221
"/pkarr/:key",
221-
get(pkarr::get).put(pkarr::put.layer(rate_limit)),
222+
if let Some(rate_limit) = rate_limit {
223+
get(pkarr::get).put(pkarr::put.layer(rate_limit))
224+
} else {
225+
get(pkarr::get).put(pkarr::put)
226+
},
222227
)
223228
.route("/healthcheck", get(|| async { "OK" }))
224229
.route("/", get(|| async { "Hi!" }))

iroh-dns-server/src/http/rate_limiting.rs

+51-8
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,64 @@
11
use std::time::Duration;
22

33
use governor::{clock::QuantaInstant, middleware::NoOpMiddleware};
4+
use serde::{Deserialize, Serialize};
45
use tower_governor::{
5-
governor::GovernorConfigBuilder, key_extractor::PeerIpKeyExtractor, GovernorLayer,
6+
governor::GovernorConfigBuilder,
7+
key_extractor::{PeerIpKeyExtractor, SmartIpKeyExtractor},
8+
GovernorLayer,
69
};
710

11+
/// Config for http rate limit.
12+
#[derive(Debug, Deserialize, Default, Serialize, Clone)]
13+
#[serde(rename_all = "lowercase")]
14+
pub enum RateLimitConfig {
15+
/// Disable rate limit for http server.
16+
Disabled,
17+
/// Enable rate limit for http server based on the connection peer IP address.
18+
/// https://docs.rs/tower_governor/latest/tower_governor/key_extractor/struct.PeerIpKeyExtractor.html
19+
#[default]
20+
Simple,
21+
/// Enable rate limit for http server based on a smart logic for extracting the connection original IP address, useful for reverse proxies.
22+
/// https://docs.rs/tower_governor/latest/tower_governor/key_extractor/struct.SmartIpKeyExtractor.html
23+
Smart,
24+
}
25+
26+
impl Default for &RateLimitConfig {
27+
fn default() -> Self {
28+
&RateLimitConfig::Simple
29+
}
30+
}
31+
832
/// Create the default rate-limiting layer.
933
///
1034
/// This spawns a background thread to clean up the rate limiting cache.
11-
pub fn create() -> GovernorLayer<'static, PeerIpKeyExtractor, NoOpMiddleware<QuantaInstant>> {
35+
pub fn create(
36+
rate_limit_config: &RateLimitConfig,
37+
) -> Option<GovernorLayer<'static, PeerIpKeyExtractor, NoOpMiddleware<QuantaInstant>>> {
38+
let use_smart_extractor = match rate_limit_config {
39+
RateLimitConfig::Disabled => {
40+
tracing::info!("Rate limiting disabled");
41+
return None;
42+
}
43+
RateLimitConfig::Simple => false,
44+
RateLimitConfig::Smart => true,
45+
};
46+
47+
tracing::info!("Rate limiting enabled ({rate_limit_config:?})");
48+
1249
// Configure rate limiting:
1350
// * allow bursts with up to five requests per IP address
1451
// * replenish one element every two seconds
15-
let governor_conf = GovernorConfigBuilder::default()
16-
// .use_headers()
17-
.per_second(4)
18-
.burst_size(2)
52+
let mut governor_conf_builder = GovernorConfigBuilder::default();
53+
// governor_conf_builder.use_headers()
54+
governor_conf_builder.per_second(4);
55+
governor_conf_builder.burst_size(2);
56+
57+
if use_smart_extractor {
58+
governor_conf_builder.key_extractor(SmartIpKeyExtractor);
59+
}
60+
61+
let governor_conf = governor_conf_builder
1962
.finish()
2063
.expect("failed to build rate-limiting governor");
2164

@@ -34,7 +77,7 @@ pub fn create() -> GovernorLayer<'static, PeerIpKeyExtractor, NoOpMiddleware<Qua
3477
governor_limiter.retain_recent();
3578
});
3679

37-
GovernorLayer {
80+
Some(GovernorLayer {
3881
config: &*governor_conf,
39-
}
82+
})
4083
}

iroh-dns-server/src/server.rs

+7-1
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,13 @@ impl Server {
5252
}
5353
Ok(())
5454
});
55-
let http_server = HttpServer::spawn(config.http, config.https, state.clone()).await?;
55+
let http_server = HttpServer::spawn(
56+
config.http,
57+
config.https,
58+
config.pkarr_put_rate_limit,
59+
state.clone(),
60+
)
61+
.await?;
5662
let dns_server = DnsServer::spawn(config.dns, state.dns_handler.clone()).await?;
5763
Ok(Self {
5864
http_server,

0 commit comments

Comments
 (0)