Browse Source

only create a CIDRTree for each host if necessary (#198)

A CIDRTree can be expensive to create, so only do it if we need
it. If the remote host only has one IP address and no subnets, just do
an exact IP match instead.

Fixes: #171
Wade Simmons 5 năm trước cách đây
mục cha
commit
add1b21777
3 tập tin đã thay đổi với 19 bổ sung2 xóa
  1. 9 2
      firewall.go
  2. 5 0
      firewall_test.go
  3. 5 0
      hostmap.go

+ 9 - 2
firewall.go

@@ -354,8 +354,15 @@ func (f *Firewall) Drop(packet []byte, fp FirewallPacket, incoming bool, h *Host
 	}
 	}
 
 
 	// Make sure remote address matches nebula certificate
 	// Make sure remote address matches nebula certificate
-	if h.remoteCidr.Contains(fp.RemoteIP) == nil {
-		return true
+	if remoteCidr := h.remoteCidr; remoteCidr != nil {
+		if remoteCidr.Contains(fp.RemoteIP) == nil {
+			return true
+		}
+	} else {
+		// Simple case: Certificate has one IP and no subnets
+		if fp.RemoteIP != h.hostId {
+			return true
+		}
 	}
 	}
 
 
 	// Make sure we are supposed to be handling this local ip address
 	// Make sure we are supposed to be handling this local ip address

+ 5 - 0
firewall_test.go

@@ -171,6 +171,7 @@ func TestFirewall_Drop(t *testing.T) {
 		ConnectionState: &ConnectionState{
 		ConnectionState: &ConnectionState{
 			peerCert: &c,
 			peerCert: &c,
 		},
 		},
+		hostId: ip2int(ipNet.IP),
 	}
 	}
 	h.CreateRemoteCIDR(&c)
 	h.CreateRemoteCIDR(&c)
 
 
@@ -344,6 +345,7 @@ func TestFirewall_Drop2(t *testing.T) {
 		ConnectionState: &ConnectionState{
 		ConnectionState: &ConnectionState{
 			peerCert: &c,
 			peerCert: &c,
 		},
 		},
+		hostId: ip2int(ipNet.IP),
 	}
 	}
 	h.CreateRemoteCIDR(&c)
 	h.CreateRemoteCIDR(&c)
 
 
@@ -410,6 +412,7 @@ func TestFirewall_Drop3(t *testing.T) {
 		ConnectionState: &ConnectionState{
 		ConnectionState: &ConnectionState{
 			peerCert: &c1,
 			peerCert: &c1,
 		},
 		},
+		hostId: ip2int(ipNet.IP),
 	}
 	}
 	h1.CreateRemoteCIDR(&c1)
 	h1.CreateRemoteCIDR(&c1)
 
 
@@ -424,6 +427,7 @@ func TestFirewall_Drop3(t *testing.T) {
 		ConnectionState: &ConnectionState{
 		ConnectionState: &ConnectionState{
 			peerCert: &c2,
 			peerCert: &c2,
 		},
 		},
+		hostId: ip2int(ipNet.IP),
 	}
 	}
 	h2.CreateRemoteCIDR(&c2)
 	h2.CreateRemoteCIDR(&c2)
 
 
@@ -438,6 +442,7 @@ func TestFirewall_Drop3(t *testing.T) {
 		ConnectionState: &ConnectionState{
 		ConnectionState: &ConnectionState{
 			peerCert: &c3,
 			peerCert: &c3,
 		},
 		},
+		hostId: ip2int(ipNet.IP),
 	}
 	}
 	h3.CreateRemoteCIDR(&c3)
 	h3.CreateRemoteCIDR(&c3)
 
 

+ 5 - 0
hostmap.go

@@ -623,6 +623,11 @@ func (i *HostInfo) RecvErrorExceeded() bool {
 }
 }
 
 
 func (i *HostInfo) CreateRemoteCIDR(c *cert.NebulaCertificate) {
 func (i *HostInfo) CreateRemoteCIDR(c *cert.NebulaCertificate) {
+	if len(c.Details.Ips) == 1 && len(c.Details.Subnets) == 0 {
+		// Simple case, no CIDRTree needed
+		return
+	}
+
 	remoteCidr := NewCIDRTree()
 	remoteCidr := NewCIDRTree()
 	for _, ip := range c.Details.Ips {
 	for _, ip := range c.Details.Ips {
 		remoteCidr.AddCIDR(&net.IPNet{IP: ip.IP, Mask: net.IPMask{255, 255, 255, 255}}, struct{}{})
 		remoteCidr.AddCIDR(&net.IPNet{IP: ip.IP, Mask: net.IPMask{255, 255, 255, 255}}, struct{}{})