allocations improvements and tunnel fixes (#1248)

* reduce allocations in tunnel code

Signed-off-by: Vasiliy Tolstov <v.tolstov@unistack.org>

* another allocation fix

Signed-off-by: Vasiliy Tolstov <v.tolstov@unistack.org>

* allocate maps with len if it known

Signed-off-by: Vasiliy Tolstov <v.tolstov@unistack.org>

* allocate key for send once

Signed-off-by: Vasiliy Tolstov <v.tolstov@unistack.org>
This commit is contained in:
Василий Толстов 2020-02-24 17:15:20 +03:00 committed by GitHub
parent 01d88601c0
commit 5b0175c2e5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
13 changed files with 58 additions and 31 deletions

View File

@ -155,7 +155,7 @@ func (g *grpcCodec) ReadHeader(m *codec.Message, mt codec.MessageType) error {
m = new(codec.Message) m = new(codec.Message)
} }
if m.Header == nil { if m.Header == nil {
m.Header = make(map[string]string) m.Header = make(map[string]string, len(md))
} }
for k, v := range md { for k, v := range md {
m.Header[k] = strings.Join(v, ",") m.Header[k] = strings.Join(v, ",")

View File

@ -110,13 +110,18 @@ func (g *grpcClient) next(request client.Request, opts client.CallOptions) (sele
} }
func (g *grpcClient) call(ctx context.Context, node *registry.Node, req client.Request, rsp interface{}, opts client.CallOptions) error { func (g *grpcClient) call(ctx context.Context, node *registry.Node, req client.Request, rsp interface{}, opts client.CallOptions) error {
var header map[string]string
address := node.Address address := node.Address
header := make(map[string]string) header = make(map[string]string)
if md, ok := metadata.FromContext(ctx); ok { if md, ok := metadata.FromContext(ctx); ok {
header = make(map[string]string, len(md))
for k, v := range md { for k, v := range md {
header[k] = v header[k] = v
} }
} else {
header = make(map[string]string)
} }
// set timeout in nanoseconds // set timeout in nanoseconds
@ -182,13 +187,17 @@ func (g *grpcClient) call(ctx context.Context, node *registry.Node, req client.R
} }
func (g *grpcClient) stream(ctx context.Context, node *registry.Node, req client.Request, opts client.CallOptions) (client.Stream, error) { func (g *grpcClient) stream(ctx context.Context, node *registry.Node, req client.Request, opts client.CallOptions) (client.Stream, error) {
var header map[string]string
address := node.Address address := node.Address
header := make(map[string]string)
if md, ok := metadata.FromContext(ctx); ok { if md, ok := metadata.FromContext(ctx); ok {
header = make(map[string]string, len(md))
for k, v := range md { for k, v := range md {
header[k] = v header[k] = v
} }
} else {
header = make(map[string]string)
} }
// set timeout in nanoseconds // set timeout in nanoseconds

View File

@ -27,7 +27,7 @@ func (r *response) Header() map[string]string {
if err != nil { if err != nil {
return map[string]string{} return map[string]string{}
} }
hdr := make(map[string]string) hdr := make(map[string]string, len(md))
for k, v := range md { for k, v := range md {
hdr[k] = strings.Join(v, ",") hdr[k] = strings.Join(v, ",")
} }

View File

@ -58,7 +58,7 @@ func FromContext(ctx context.Context) (Metadata, bool) {
} }
// capitalise all values // capitalise all values
newMD := make(map[string]string) newMD := make(map[string]string, len(md))
for k, v := range md { for k, v := range md {
newMD[strings.Title(k)] = v newMD[strings.Title(k)] = v
} }

View File

@ -7,12 +7,12 @@ import (
) )
func serviceToRecord(s *registry.Service, ttl time.Duration) *record { func serviceToRecord(s *registry.Service, ttl time.Duration) *record {
metadata := make(map[string]string) metadata := make(map[string]string, len(s.Metadata))
for k, v := range s.Metadata { for k, v := range s.Metadata {
metadata[k] = v metadata[k] = v
} }
nodes := make(map[string]*node) nodes := make(map[string]*node, len(s.Nodes))
for _, n := range s.Nodes { for _, n := range s.Nodes {
nodes[n.Id] = &node{ nodes[n.Id] = &node{
Node: n, Node: n,
@ -36,7 +36,7 @@ func serviceToRecord(s *registry.Service, ttl time.Duration) *record {
} }
func recordToService(r *record) *registry.Service { func recordToService(r *record) *registry.Service {
metadata := make(map[string]string) metadata := make(map[string]string, len(r.Metadata))
for k, v := range r.Metadata { for k, v := range r.Metadata {
metadata[k] = v metadata[k] = v
} }
@ -52,7 +52,7 @@ func recordToService(r *record) *registry.Service {
*response = *e.Response *response = *e.Response
} }
metadata := make(map[string]string) metadata := make(map[string]string, len(e.Metadata))
for k, v := range e.Metadata { for k, v := range e.Metadata {
metadata[k] = v metadata[k] = v
} }
@ -68,7 +68,7 @@ func recordToService(r *record) *registry.Service {
nodes := make([]*registry.Node, len(r.Nodes)) nodes := make([]*registry.Node, len(r.Nodes))
i := 0 i := 0
for _, n := range r.Nodes { for _, n := range r.Nodes {
metadata := make(map[string]string) metadata := make(map[string]string, len(n.Metadata))
for k, v := range n.Metadata { for k, v := range n.Metadata {
metadata[k] = v metadata[k] = v
} }

View File

@ -140,7 +140,7 @@ func (g *grpcCodec) ReadHeader(m *codec.Message, mt codec.MessageType) error {
m = new(codec.Message) m = new(codec.Message)
} }
if m.Header == nil { if m.Header == nil {
m.Header = make(map[string]string) m.Header = make(map[string]string, len(md))
} }
for k, v := range md { for k, v := range md {
m.Header[k] = strings.Join(v, ",") m.Header[k] = strings.Join(v, ",")

View File

@ -188,7 +188,7 @@ func (g *grpcServer) createSubHandler(sb *subscriber, opts server.Options) broke
return err return err
} }
hdr := make(map[string]string) hdr := make(map[string]string, len(msg.Header))
for k, v := range msg.Header { for k, v := range msg.Header {
hdr[k] = v hdr[k] = v
} }

View File

@ -85,7 +85,7 @@ func (s *rpcServer) HandleEvent(e broker.Event) error {
} }
// copy headers // copy headers
hdr := make(map[string]string) hdr := make(map[string]string, len(msg.Header))
for k, v := range msg.Header { for k, v := range msg.Header {
hdr[k] = v hdr[k] = v
} }
@ -262,7 +262,7 @@ func (s *rpcServer) ServeConn(sock transport.Socket) {
ct := msg.Header["Content-Type"] ct := msg.Header["Content-Type"]
// copy the message headers // copy the message headers
hdr := make(map[string]string) hdr := make(map[string]string, len(msg.Header))
for k, v := range msg.Header { for k, v := range msg.Header {
hdr[k] = v hdr[k] = v
} }

View File

@ -156,7 +156,7 @@ func (h *httpTransportClient) Recv(m *Message) error {
m.Body = b m.Body = b
if m.Header == nil { if m.Header == nil {
m.Header = make(map[string]string) m.Header = make(map[string]string, len(rsp.Header))
} }
for k, v := range rsp.Header { for k, v := range rsp.Header {
@ -193,10 +193,6 @@ func (h *httpTransportSocket) Recv(m *Message) error {
return errors.New("message passed in is nil") return errors.New("message passed in is nil")
} }
if m.Header == nil {
m.Header = make(map[string]string)
}
// process http 1 // process http 1
if h.r.ProtoMajor == 1 { if h.r.ProtoMajor == 1 {
// set timeout if its greater than 0 // set timeout if its greater than 0
@ -228,6 +224,10 @@ func (h *httpTransportSocket) Recv(m *Message) error {
r.Body.Close() r.Body.Close()
m.Body = b m.Body = b
if m.Header == nil {
m.Header = make(map[string]string, len(r.Header))
}
// set headers // set headers
for k, v := range r.Header { for k, v := range r.Header {
if len(v) > 0 { if len(v) > 0 {

View File

@ -5,7 +5,16 @@ import (
"crypto/cipher" "crypto/cipher"
"crypto/rand" "crypto/rand"
"crypto/sha256" "crypto/sha256"
"io"
"github.com/oxtoacart/bpool"
)
var (
// the local buffer pool
// gcmStandardNonceSize from crypto/cipher/gcm.go is 12 bytes
// 100 - is max size of pool
noncePool = bpool.NewBytePool(100, 12)
hashPool = bpool.NewBytePool(1024*32, 32)
) )
// hash hahes the data into 32 bytes key and returns it // hash hahes the data into 32 bytes key and returns it
@ -13,7 +22,10 @@ import (
func hash(key string) []byte { func hash(key string) []byte {
hasher := sha256.New() hasher := sha256.New()
hasher.Write([]byte(key)) hasher.Write([]byte(key))
return hasher.Sum(nil) out := hashPool.Get()
defer hashPool.Put(out[:0])
out = hasher.Sum(out[:0])
return out
} }
// Encrypt encrypts data and returns the encrypted data // Encrypt encrypts data and returns the encrypted data
@ -32,12 +44,13 @@ func Encrypt(data []byte, key string) ([]byte, error) {
return nil, err return nil, err
} }
// create a new byte array the size of the nonce // get new byte array the size of the nonce from pool
// NOTE: we might use smaller nonce size in the future // NOTE: we might use smaller nonce size in the future
nonce := make([]byte, gcm.NonceSize()) nonce := noncePool.Get()
if _, err = io.ReadFull(rand.Reader, nonce); err != nil { if _, err = rand.Read(nonce); err != nil {
return nil, err return nil, err
} }
defer noncePool.Put(nonce)
// NOTE: we prepend the nonce to the payload // NOTE: we prepend the nonce to the payload
// we need to do this as we need the same nonce // we need to do this as we need the same nonce

View File

@ -131,6 +131,7 @@ func (t *tun) newSession(channel, sessionId string) (*session, bool) {
recv: make(chan *message, 128), recv: make(chan *message, 128),
send: t.send, send: t.send,
errChan: make(chan error, 1), errChan: make(chan error, 1),
key: t.token + channel + sessionId,
} }
// save session // save session

View File

@ -77,6 +77,8 @@ func (t *tunListener) process() {
// create a new session session // create a new session session
sess = &session{ sess = &session{
// the session key
key: t.token + m.channel + sessionId,
// the id of the remote side // the id of the remote side
tunnel: m.tunnel, tunnel: m.tunnel,
// the channel // the channel

View File

@ -47,6 +47,8 @@ type session struct {
link string link string
// the error response // the error response
errChan chan error errChan chan error
// key for session encryption
key string
} }
// message is sent over the send channel // message is sent over the send channel
@ -326,22 +328,22 @@ func (s *session) Announce() error {
// Send is used to send a message // Send is used to send a message
func (s *session) Send(m *transport.Message) error { func (s *session) Send(m *transport.Message) error {
// encrypt the transport message payload // encrypt the transport message payload
body, err := Encrypt(m.Body, s.token+s.channel+s.session) body, err := Encrypt(m.Body, s.key)
if err != nil { if err != nil {
log.Debugf("failed to encrypt message body: %v", err) log.Debugf("failed to encrypt message body: %v", err)
return err return err
} }
// make copy // make copy, without rehash and realloc
data := &transport.Message{ data := &transport.Message{
Header: make(map[string]string), Header: make(map[string]string, len(m.Header)),
Body: body, Body: body,
} }
// encrypt all the headers // encrypt all the headers
for k, v := range m.Header { for k, v := range m.Header {
// encrypt the transport message payload // encrypt the transport message payload
val, err := Encrypt([]byte(v), s.token+s.channel+s.session) val, err := Encrypt([]byte(v), s.key)
if err != nil { if err != nil {
log.Debugf("failed to encrypt message header %s: %v", k, err) log.Debugf("failed to encrypt message header %s: %v", k, err)
return err return err
@ -387,14 +389,14 @@ func (s *session) Recv(m *transport.Message) error {
default: default:
} }
//log.Tracef("Received %+v from recv backlog", msg)
log.Tracef("Received %+v from recv backlog", msg) log.Tracef("Received %+v from recv backlog", msg)
key := s.token + s.channel + msg.session
// decrypt the received payload using the token // decrypt the received payload using the token
// we have to used msg.session because multicast has a shared // we have to used msg.session because multicast has a shared
// session id of "multicast" in this session struct on // session id of "multicast" in this session struct on
// the listener side // the listener side
body, err := Decrypt(msg.data.Body, s.token+s.channel+msg.session) body, err := Decrypt(msg.data.Body, key)
if err != nil { if err != nil {
log.Debugf("failed to decrypt message body: %v", err) log.Debugf("failed to decrypt message body: %v", err)
return err return err
@ -410,7 +412,7 @@ func (s *session) Recv(m *transport.Message) error {
return err return err
} }
// encrypt the transport message payload // encrypt the transport message payload
val, err := Decrypt([]byte(h), s.token+s.channel+msg.session) val, err := Decrypt([]byte(h), key)
if err != nil { if err != nil {
log.Debugf("failed to decrypt message header %s: %v", k, err) log.Debugf("failed to decrypt message header %s: %v", k, err)
return err return err