mirror of
https://github.com/haveno-dex/haveno.git
synced 2024-12-22 11:39:29 +00:00
throttle log warnings in Connection.java to 30s
This commit is contained in:
parent
180fde87cc
commit
75b96e83da
2 changed files with 59 additions and 54 deletions
|
@ -171,9 +171,11 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
private final Capabilities capabilities = new Capabilities();
|
||||
|
||||
// throttle logs of reported invalid requests
|
||||
private static long lastLoggedInvalidRequestReport = 0;
|
||||
private static int unloggedInvalidRequestReports = 0;
|
||||
private static final long LOG_INVALID_REQUEST_REPORTS_INTERVAL_MS = 60000; // log invalid request reports once every 60s
|
||||
private static final long LOG_THROTTLE_INTERVAL_MS = 30000; // throttle logging rule violations and warnings to once every 30 seconds
|
||||
private static long lastLoggedInvalidRequestReportTs = 0;
|
||||
private static int numUnloggedInvalidRequestReports = 0;
|
||||
private static long lastLoggedWarningTs = 0;
|
||||
private static int numUnloggedWarnings = 0;
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////////////////////
|
||||
// Constructor
|
||||
|
@ -218,8 +220,7 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
if (peersNodeAddress != null) {
|
||||
setPeersNodeAddress(peersNodeAddress);
|
||||
if (banFilter != null && banFilter.isPeerBanned(peersNodeAddress)) {
|
||||
log.warn("We created an outbound connection with a banned peer");
|
||||
reportInvalidRequest(RuleViolation.PEER_BANNED);
|
||||
reportInvalidRequest(RuleViolation.PEER_BANNED, "We created an outbound connection with a banned peer");
|
||||
}
|
||||
}
|
||||
ThreadUtils.execute(() -> connectionListener.onConnection(this), THREAD_ID);
|
||||
|
@ -249,8 +250,8 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
if (banFilter != null &&
|
||||
peersNodeAddressOptional.isPresent() &&
|
||||
banFilter.isPeerBanned(peersNodeAddressOptional.get())) {
|
||||
log.warn("We tried to send a message to a banned peer. message={}", networkEnvelope.getClass().getSimpleName());
|
||||
reportInvalidRequest(RuleViolation.PEER_BANNED);
|
||||
String errorMessage = "We tried to send a message to a banned peer. message=" + networkEnvelope.getClass().getSimpleName();
|
||||
reportInvalidRequest(RuleViolation.PEER_BANNED, errorMessage);
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -419,7 +420,7 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
if (networkEnvelope instanceof SendersNodeAddressMessage) {
|
||||
boolean isValid = processSendersNodeAddressMessage((SendersNodeAddressMessage) networkEnvelope);
|
||||
if (!isValid) {
|
||||
log.warn("Received an invalid {} at processing BundleOfEnvelopes", networkEnvelope.getClass().getSimpleName());
|
||||
throttleWarn("Received an invalid " + networkEnvelope.getClass().getSimpleName() + " at processing BundleOfEnvelopes");
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
@ -610,20 +611,20 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
* Runs in same thread as Connection
|
||||
*/
|
||||
|
||||
public boolean reportInvalidRequest(RuleViolation ruleViolation) {
|
||||
return Connection.reportInvalidRequest(this, ruleViolation);
|
||||
public boolean reportInvalidRequest(RuleViolation ruleViolation, String errorMessage) {
|
||||
return Connection.reportInvalidRequest(this, ruleViolation, errorMessage);
|
||||
}
|
||||
|
||||
private static synchronized boolean reportInvalidRequest(Connection connection, RuleViolation ruleViolation) {
|
||||
private static synchronized boolean reportInvalidRequest(Connection connection, RuleViolation ruleViolation, String errorMessage) {
|
||||
|
||||
// determine if report should be logged to avoid spamming the logs
|
||||
boolean logReport = System.currentTimeMillis() - lastLoggedInvalidRequestReport > LOG_INVALID_REQUEST_REPORTS_INTERVAL_MS;
|
||||
boolean logReport = System.currentTimeMillis() - lastLoggedInvalidRequestReportTs > LOG_THROTTLE_INTERVAL_MS;
|
||||
|
||||
// count the number of unlogged reports since last log entry
|
||||
if (!logReport) unloggedInvalidRequestReports++;
|
||||
if (!logReport) numUnloggedInvalidRequestReports++;
|
||||
|
||||
// handle report
|
||||
if (logReport) log.info("We got reported the ruleViolation {} at connection with address {} and uid {}", ruleViolation, connection.getPeersNodeAddressProperty(), connection.getUid());
|
||||
if (logReport) log.warn("We got reported the ruleViolation {} at connection with address={}, uid={}, errorMessage={}", ruleViolation, connection.getPeersNodeAddressProperty(), connection.getUid(), errorMessage);
|
||||
int numRuleViolations;
|
||||
numRuleViolations = connection.ruleViolations.getOrDefault(ruleViolation, 0);
|
||||
numRuleViolations++;
|
||||
|
@ -654,9 +655,9 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
|
||||
private static synchronized void resetReportedInvalidRequestsThrottle(boolean logReport) {
|
||||
if (logReport) {
|
||||
if (unloggedInvalidRequestReports > 0) log.warn("We received {} other reports of invalid requests since the last log entry", unloggedInvalidRequestReports);
|
||||
unloggedInvalidRequestReports = 0;
|
||||
lastLoggedInvalidRequestReport = System.currentTimeMillis();
|
||||
if (numUnloggedInvalidRequestReports > 0) log.warn("We received {} other reports of invalid requests since the last log entry", numUnloggedInvalidRequestReports);
|
||||
numUnloggedInvalidRequestReports = 0;
|
||||
lastLoggedInvalidRequestReportTs = System.currentTimeMillis();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -673,25 +674,22 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
else
|
||||
closeConnectionReason = CloseConnectionReason.RESET;
|
||||
|
||||
log.info("SocketException (expected if connection lost). closeConnectionReason={}; connection={}", closeConnectionReason, this);
|
||||
throttleWarn("SocketException (expected if connection lost). closeConnectionReason=" + closeConnectionReason + "; connection=" + this);
|
||||
} else if (e instanceof SocketTimeoutException || e instanceof TimeoutException) {
|
||||
closeConnectionReason = CloseConnectionReason.SOCKET_TIMEOUT;
|
||||
log.info("Shut down caused by exception {} on connection={}", e, this);
|
||||
throttleWarn("Shut down caused by exception " + e.getMessage() + " on connection=" + this);
|
||||
} else if (e instanceof EOFException) {
|
||||
closeConnectionReason = CloseConnectionReason.TERMINATED;
|
||||
log.warn("Shut down caused by exception {} on connection={}", e, this);
|
||||
throttleWarn("Shut down caused by exception " + e.getMessage() + " on connection=" + this);
|
||||
} else if (e instanceof OptionalDataException || e instanceof StreamCorruptedException) {
|
||||
closeConnectionReason = CloseConnectionReason.CORRUPTED_DATA;
|
||||
log.warn("Shut down caused by exception {} on connection={}", e, this);
|
||||
throttleWarn("Shut down caused by exception " + e.getMessage() + " on connection=" + this);
|
||||
} else {
|
||||
// TODO sometimes we get StreamCorruptedException, OptionalDataException, IllegalStateException
|
||||
closeConnectionReason = CloseConnectionReason.UNKNOWN_EXCEPTION;
|
||||
log.warn("Unknown reason for exception at socket: {}\n\t" +
|
||||
"peer={}\n\t" +
|
||||
"Exception={}",
|
||||
socket.toString(),
|
||||
this.peersNodeAddressOptional,
|
||||
e.toString());
|
||||
throttleWarn("Unknown reason for exception at socket: " + socket.toString() + "\n\t" +
|
||||
"peer=" + this.peersNodeAddressOptional + "\n\t" +
|
||||
"Exception=" + e.toString());
|
||||
}
|
||||
shutDown(closeConnectionReason);
|
||||
}
|
||||
|
@ -712,8 +710,8 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
}
|
||||
|
||||
if (banFilter != null && banFilter.isPeerBanned(senderNodeAddress)) {
|
||||
log.warn("We got a message from a banned peer. message={}", sendersNodeAddressMessage.getClass().getSimpleName());
|
||||
reportInvalidRequest(RuleViolation.PEER_BANNED);
|
||||
String errorMessage = "We got a message from a banned peer. message=" + sendersNodeAddressMessage.getClass().getSimpleName();
|
||||
reportInvalidRequest(RuleViolation.PEER_BANNED, errorMessage);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -745,7 +743,7 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
try {
|
||||
if (socket != null &&
|
||||
socket.isClosed()) {
|
||||
log.warn("Socket is null or closed socket={}", socket);
|
||||
throttleWarn("Socket is null or closed socket=" + socket);
|
||||
shutDown(CloseConnectionReason.SOCKET_CLOSED);
|
||||
return;
|
||||
}
|
||||
|
@ -757,7 +755,7 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
|
||||
if (socket != null &&
|
||||
socket.isClosed()) {
|
||||
log.warn("Socket is null or closed socket={}", socket);
|
||||
throttleWarn("Socket is null or closed socket=" + socket);
|
||||
shutDown(CloseConnectionReason.SOCKET_CLOSED);
|
||||
return;
|
||||
}
|
||||
|
@ -767,9 +765,9 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
return;
|
||||
}
|
||||
if (protoInputStream.read() == -1) {
|
||||
log.warn("proto is null because protoInputStream.read()=-1 (EOF). That is expected if client got stopped without proper shutdown.");
|
||||
throttleWarn("proto is null because protoInputStream.read()=-1 (EOF). That is expected if client got stopped without proper shutdown.");
|
||||
} else {
|
||||
log.warn("proto is null. protoInputStream.read()=" + protoInputStream.read());
|
||||
throttleWarn("proto is null. protoInputStream.read()=" + protoInputStream.read());
|
||||
}
|
||||
shutDown(CloseConnectionReason.NO_PROTO_BUFFER_ENV);
|
||||
return;
|
||||
|
@ -778,8 +776,8 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
if (banFilter != null &&
|
||||
peersNodeAddressOptional.isPresent() &&
|
||||
banFilter.isPeerBanned(peersNodeAddressOptional.get())) {
|
||||
log.warn("We got a message from a banned peer. proto={}", Utilities.toTruncatedString(proto));
|
||||
reportInvalidRequest(RuleViolation.PEER_BANNED);
|
||||
String errorMessage = "We got a message from a banned peer. proto=" + Utilities.toTruncatedString(proto);
|
||||
reportInvalidRequest(RuleViolation.PEER_BANNED, errorMessage);
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -814,30 +812,28 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
|
||||
if (networkEnvelope instanceof AddPersistableNetworkPayloadMessage &&
|
||||
!((AddPersistableNetworkPayloadMessage) networkEnvelope).getPersistableNetworkPayload().verifyHashSize()) {
|
||||
log.warn("PersistableNetworkPayload.verifyHashSize failed. hashSize={}; object={}",
|
||||
((AddPersistableNetworkPayloadMessage) networkEnvelope).getPersistableNetworkPayload().getHash().length,
|
||||
Utilities.toTruncatedString(proto));
|
||||
if (reportInvalidRequest(RuleViolation.MAX_MSG_SIZE_EXCEEDED))
|
||||
String errorMessage = "PersistableNetworkPayload.verifyHashSize failed. hashSize=" +
|
||||
((AddPersistableNetworkPayloadMessage) networkEnvelope).getPersistableNetworkPayload().getHash().length + "; object=" +
|
||||
Utilities.toTruncatedString(proto);
|
||||
if (reportInvalidRequest(RuleViolation.MAX_MSG_SIZE_EXCEEDED, errorMessage))
|
||||
return;
|
||||
}
|
||||
|
||||
if (exceeds) {
|
||||
log.warn("size > MAX_MSG_SIZE. size={}; object={}", size, Utilities.toTruncatedString(proto));
|
||||
|
||||
if (reportInvalidRequest(RuleViolation.MAX_MSG_SIZE_EXCEEDED))
|
||||
String errorMessage = "size > MAX_MSG_SIZE. size=" + size + "; object=" + Utilities.toTruncatedString(proto);
|
||||
if (reportInvalidRequest(RuleViolation.MAX_MSG_SIZE_EXCEEDED, errorMessage))
|
||||
return;
|
||||
}
|
||||
|
||||
if (violatesThrottleLimit() && reportInvalidRequest(RuleViolation.THROTTLE_LIMIT_EXCEEDED))
|
||||
if (violatesThrottleLimit() && reportInvalidRequest(RuleViolation.THROTTLE_LIMIT_EXCEEDED, "Violates throttle limit"))
|
||||
return;
|
||||
|
||||
// Check P2P network ID
|
||||
String errorMessage = "RuleViolation.WRONG_NETWORK_ID. version of message=" + proto.getMessageVersion() +
|
||||
", app version=" + Version.getP2PMessageVersion() +
|
||||
", proto.toTruncatedString=" + Utilities.toTruncatedString(proto.toString());
|
||||
if (!proto.getMessageVersion().equals(Version.getP2PMessageVersion())
|
||||
&& reportInvalidRequest(RuleViolation.WRONG_NETWORK_ID)) {
|
||||
log.warn("RuleViolation.WRONG_NETWORK_ID. version of message={}, app version={}, " +
|
||||
"proto.toTruncatedString={}", proto.getMessageVersion(),
|
||||
Version.getP2PMessageVersion(),
|
||||
Utilities.toTruncatedString(proto.toString()));
|
||||
&& reportInvalidRequest(RuleViolation.WRONG_NETWORK_ID, errorMessage)) {
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -879,12 +875,9 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
ThreadUtils.execute(() -> connectionStatistics.addReceivedMsgMetrics(System.currentTimeMillis() - ts, size), THREAD_ID);
|
||||
}
|
||||
} catch (InvalidClassException e) {
|
||||
log.error(e.getMessage());
|
||||
e.printStackTrace();
|
||||
reportInvalidRequest(RuleViolation.INVALID_CLASS);
|
||||
reportInvalidRequest(RuleViolation.INVALID_CLASS, e.getMessage());
|
||||
} catch (ProtobufferException | NoClassDefFoundError | InvalidProtocolBufferException e) {
|
||||
log.error(e.getMessage());
|
||||
reportInvalidRequest(RuleViolation.INVALID_DATA_TYPE);
|
||||
reportInvalidRequest(RuleViolation.INVALID_DATA_TYPE, e.getMessage());
|
||||
} catch (Throwable t) {
|
||||
handleException(t);
|
||||
}
|
||||
|
@ -943,4 +936,16 @@ public class Connection implements HasCapabilities, Runnable, MessageListener {
|
|||
NodeAddress nodeAddress = getSenderNodeAddress(networkEnvelope);
|
||||
return nodeAddress == null ? "null" : nodeAddress.getFullAddress();
|
||||
}
|
||||
|
||||
private synchronized void throttleWarn(String msg) {
|
||||
boolean logWarning = System.currentTimeMillis() - lastLoggedWarningTs > LOG_THROTTLE_INTERVAL_MS;
|
||||
if (logWarning) {
|
||||
log.warn(msg);
|
||||
if (numUnloggedWarnings > 0) log.warn("We received {} other log warnings since the last log entry", numUnloggedWarnings);
|
||||
numUnloggedWarnings = 0;
|
||||
lastLoggedWarningTs = System.currentTimeMillis();
|
||||
} else {
|
||||
numUnloggedWarnings++;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -381,7 +381,7 @@ public final class PeerManager implements ConnectionListener, PersistedDataHost
|
|||
// If a node is trying to send too many list we treat it as rule violation.
|
||||
// Reported list include the connected list. We use the max value and give some extra headroom.
|
||||
// Will trigger a shutdown after 2nd time sending too much
|
||||
connection.reportInvalidRequest(RuleViolation.TOO_MANY_REPORTED_PEERS_SENT);
|
||||
connection.reportInvalidRequest(RuleViolation.TOO_MANY_REPORTED_PEERS_SENT, "Too many reported peers sent");
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in a new issue