// transferRWI.java // ----------------------- // part of the AnomicHTTPD caching proxy // (C) by Michael Peter Christen; mc@yacy.net // first published on http://www.anomic.de // Frankfurt, Germany, 2004, 2005 // // $LastChangedDate$ // $LastChangedRevision$ // $LastChangedBy$ // // This program is free software; you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation; either version 2 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; if not, write to the Free Software // Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA // You must compile this file with // javac -classpath .:../classes transferRWI.java import java.util.ArrayList; import java.util.HashSet; import java.util.Iterator; import java.util.Set; import net.yacy.cora.document.encoding.ASCII; import net.yacy.cora.document.encoding.UTF8; import net.yacy.cora.document.feed.RSSMessage; import net.yacy.cora.federate.yacy.Distribution; import net.yacy.cora.protocol.HeaderFramework; import net.yacy.cora.protocol.RequestHeader; import net.yacy.cora.storage.HandleSet; import net.yacy.cora.util.ConcurrentLog; import net.yacy.cora.util.Memory; import net.yacy.cora.util.SpaceExceededException; import net.yacy.kelondro.data.meta.URIMetadataRow; import net.yacy.kelondro.data.word.WordReferenceRow; import net.yacy.kelondro.index.RowHandleSet; import net.yacy.kelondro.util.FileUtils; import net.yacy.peers.EventChannel; import net.yacy.peers.Network; import net.yacy.peers.Protocol; import net.yacy.peers.Seed; import net.yacy.repository.Blacklist.BlacklistType; import net.yacy.search.Switchboard; import net.yacy.search.SwitchboardConstants; import net.yacy.server.serverCore; import net.yacy.server.serverObjects; import net.yacy.server.serverSwitch; public final class transferRWI { public static serverObjects respond(final RequestHeader header, final serverObjects post, final serverSwitch env) throws InterruptedException { // return variable that accumulates replacements final Switchboard sb = (Switchboard) env; // remember the peer contact for peer statistics final String clientip = header.get(HeaderFramework.CONNECTION_PROP_CLIENTIP, ""); // read an artificial header addendum final String userAgent = header.get(HeaderFramework.USER_AGENT, ""); sb.peers.peerActions.setUserAgent(clientip, userAgent); final serverObjects prop = new serverObjects(); final String contentType = header.getContentType(); if ((post == null) || (env == null)) { logWarning(contentType, "post or env is null!"); return prop; } if (!Protocol.authentifyRequest(post, env)) { logWarning(contentType, "not authentified"); return prop; } if (!post.containsKey("wordc")) { logWarning(contentType, "missing wordc"); return prop; } if (!post.containsKey("entryc")) { logWarning(contentType, "missing entryc"); return prop; } // request values final String iam = post.get("iam", ""); // seed hash of requester final String youare = post.get("youare", ""); // seed hash of the target peer, needed for network stability // final String key = (String) post.get("key", ""); // transmission key final int wordc = post.getInt("wordc", 0); // number of different words final int entryc = post.getInt("entryc", 0); // number of entries in indexes byte[] indexes = post.get("indexes", "").getBytes(); // the indexes, as list of word entries boolean granted = sb.getConfigBool("allowReceiveIndex", false); final boolean blockBlacklist = sb.getConfigBool("indexReceiveBlockBlacklist", false); final long cachelimit = sb.getConfigLong(SwitchboardConstants.WORDCACHE_MAX_COUNT, 100000); final Seed otherPeer = sb.peers.get(iam); final String otherPeerName = iam + ":" + ((otherPeer == null) ? "NULL" : (otherPeer.getName() + "/" + otherPeer.getVersion())); // response values int pause = 0; String result = "ok"; final StringBuilder unknownURLs = new StringBuilder(6000); double load = Memory.load(); float maxload = sb.getConfigFloat(SwitchboardConstants.INDEX_TRANSFER_MAXLOAD, 1.5f); if (load > maxload) { // too high local load. this is bad but we must reject this to protect ourself! sb.getLog().info("Rejecting RWIs from peer " + otherPeerName + ", system has too high load = " + load + ", maxload = " + maxload); result = "not_granted"; pause = (int) (load * 20000); } else if ((youare == null) || (!youare.equals(sb.peers.mySeed().hash))) { sb.getLog().info("Rejecting RWIs from peer " + otherPeerName + ". Wrong target. Wanted peer=" + youare + ", iam=" + sb.peers.mySeed().hash); result = "wrong_target"; pause = 0; } else if (otherPeer == null) { // we dont want to receive indexes sb.getLog().info("Rejecting RWIs from peer " + otherPeerName + ". Not granted. Other Peer is unknown"); result = "not_granted"; pause = 60000; } else if (!granted) { // we dont want to receive indexes sb.getLog().info("Rejecting RWIs from peer " + otherPeerName + ". Granted is false"); result = "not_granted"; pause = 60000; } else if (sb.isRobinsonMode()) { // we dont want to receive indexes sb.getLog().info("Rejecting RWIs from peer " + otherPeerName + ". Not granted. This peer is in robinson mode"); result = "not_granted"; pause = 60000; } else if (sb.index.RWIBufferCount() > cachelimit) { // we are too busy to receive indexes sb.getLog().info("Rejecting RWIs from peer " + otherPeerName + ". We are too busy (buffersize=" + sb.index.RWIBufferCount() + ")."); granted = false; // don't accept more words if there are too many words to flush result = "busy"; pause = 60000; } else if (otherPeer.getVersion() < 0.75005845 && otherPeer.getVersion() >= 0.75005821) { // version that sends [B@... hashes sb.getLog().info("Rejecting RWIs from peer " + otherPeerName + ". Bad version."); result = "not_granted"; pause = 1800000; } else { // we want and can receive indexes // log value status (currently added to find outOfMemory error if (sb.getLog().isFine()) sb.getLog().fine("Processing " + indexes.length + " bytes / " + wordc + " words / " + entryc + " entries from " + otherPeerName); final long startProcess = System.currentTimeMillis(); // decode request //System.out.println("STRINGS " + UTF8.String(indexes)); final Iterator it = FileUtils.strings(indexes); // free memory indexes = null; // now parse the Strings in the value-vector and write index entries String estring; int p; String wordHash; byte[] urlHash; WordReferenceRow iEntry; final HandleSet unknownURL = new RowHandleSet(URIMetadataRow.rowdef.primaryKeyLength, URIMetadataRow.rowdef.objectOrder, 0); final HandleSet knownURL = new RowHandleSet(URIMetadataRow.rowdef.primaryKeyLength, URIMetadataRow.rowdef.objectOrder, 0); final ArrayList wordhashes = new ArrayList(); int received = 0; int blocked = 0; int count = 0; Set testids = new HashSet(); while (it.hasNext()) { serverCore.checkInterruption(); estring = it.next(); count++; if (count > 1000) break; // protection against flooding // check if RWI entry is well-formed p = estring.indexOf('{',0); if (p < 0 || estring.indexOf("x=",0) < 0 || !(estring.indexOf("[B@",0) < 0)) { blocked++; continue; } wordHash = estring.substring(0, p); wordhashes.add(wordHash); iEntry = new WordReferenceRow(estring.substring(p)); urlHash = iEntry.urlhash(); // block blacklisted entries if ((blockBlacklist) && (Switchboard.urlBlacklist.hashInBlacklistedCache(BlacklistType.DHT, urlHash))) { Network.log.fine("transferRWI: blocked blacklisted URLHash '" + ASCII.String(urlHash) + "' from peer " + otherPeerName); blocked++; continue; } // check if the entry is in our network domain final String urlRejectReason = sb.crawlStacker.urlInAcceptedDomainHash(urlHash); if (urlRejectReason != null) { Network.log.warn("transferRWI: blocked URL hash '" + ASCII.String(urlHash) + "' (" + urlRejectReason + ") from peer " + otherPeerName + "; peer is suspected to be a spam-peer (or something is wrong)"); //if (yacyCore.log.isFine()) yacyCore.log.logFine("transferRWI: blocked URL hash '" + urlHash + "' (" + urlRejectReason + ") from peer " + otherPeerName); blocked++; continue; } // learn entry try { sb.index.storeRWI(ASCII.getBytes(wordHash), iEntry); } catch (final Exception e) { ConcurrentLog.logException(e); } serverCore.checkInterruption(); // check if we need to ask for the corresponding URL testids.add(ASCII.String(urlHash)); received++; } Set existing = sb.index.fulltext().exists(testids); for (String id: testids) { try { if (existing.contains(id)) { knownURL.put(ASCII.getBytes(id)); } else { unknownURL.put(ASCII.getBytes(id)); } } catch (final SpaceExceededException e) { sb.getLog().warn("transferRWI: DB-Error while trying to determine if URL with hash '" + id + "' is known.", e); } } sb.peers.mySeed().incRI(received); // finally compose the unknownURL hash list final Iterator bit = unknownURL.iterator(); unknownURLs.ensureCapacity(unknownURL.size() * 25); while (bit.hasNext()) { unknownURLs.append(UTF8.String(bit.next())).append(','); } if (unknownURLs.length() > 0) { unknownURLs.setLength(unknownURLs.length() - 1); } if (wordhashes.isEmpty() || received == 0) { sb.getLog().info("Received 0 RWIs from " + otherPeerName + ", processed in " + (System.currentTimeMillis() - startProcess) + " milliseconds, requesting " + unknownURL.size() + " URLs, blocked " + blocked + " RWIs"); } else { final String firstHash = wordhashes.get(0); final String lastHash = wordhashes.get(wordhashes.size() - 1); final long avdist = (Distribution.horizontalDHTDistance(firstHash.getBytes(), ASCII.getBytes(sb.peers.mySeed().hash)) + Distribution.horizontalDHTDistance(lastHash.getBytes(), ASCII.getBytes(sb.peers.mySeed().hash))) / 2; sb.getLog().info("Received " + received + " RWIs, " + wordc + " Words [" + firstHash + " .. " + lastHash + "], processed in " + (System.currentTimeMillis() - startProcess) + " milliseconds, " + avdist + ", blocked " + blocked + ", requesting " + unknownURL.size() + "/" + received+ " URLs from " + otherPeerName); EventChannel.channels(EventChannel.DHTRECEIVE).addMessage(new RSSMessage("Received " + received + " RWIs, " + wordc + " Words [" + firstHash + " .. " + lastHash + "], processed in " + (System.currentTimeMillis() - startProcess) + " milliseconds, " + avdist + ", blocked " + blocked + ", requesting " + unknownURL.size() + "/" + received + " URLs from " + otherPeerName, "", otherPeer.hash)); } result = "ok"; pause = (int) (sb.index.RWIBufferCount() * 20000 / sb.getConfigLong(SwitchboardConstants.WORDCACHE_MAX_COUNT, 100000)); // estimation of necessary pause time } prop.put("unknownURL", unknownURLs.toString()); prop.put("result", result); prop.put("pause", pause); // return rewrite properties return prop; } /** * @param requestIdentifier * @param msg */ private static void logWarning(final String requestIdentifier, final String msg) { ConcurrentLog.warn("transferRWI", requestIdentifier +" "+ msg); } }