2022-03-25 15:41:38 +00:00
|
|
|
use crate::{settings::structs::RateLimitConfig, utils::get_ip, IpAddr};
|
|
|
|
use actix_web::{
|
|
|
|
dev::{Service, ServiceRequest, ServiceResponse, Transform},
|
|
|
|
HttpResponse,
|
|
|
|
};
|
2020-12-21 23:27:42 +00:00
|
|
|
use futures::future::{ok, Ready};
|
2022-03-27 00:29:05 +00:00
|
|
|
use parking_lot::Mutex;
|
2020-04-20 03:59:07 +00:00
|
|
|
use rate_limiter::{RateLimitType, RateLimiter};
|
2020-05-16 14:04:08 +00:00
|
|
|
use std::{
|
|
|
|
future::Future,
|
|
|
|
pin::Pin,
|
2022-03-25 15:41:38 +00:00
|
|
|
rc::Rc,
|
2020-05-16 14:04:08 +00:00
|
|
|
sync::Arc,
|
|
|
|
task::{Context, Poll},
|
|
|
|
};
|
2020-04-19 22:08:25 +00:00
|
|
|
|
2020-05-16 14:04:08 +00:00
|
|
|
pub mod rate_limiter;
|
|
|
|
|
2020-04-19 22:08:25 +00:00
|
|
|
#[derive(Debug, Clone)]
|
2020-04-20 17:51:42 +00:00
|
|
|
pub struct RateLimit {
|
2020-07-01 12:54:29 +00:00
|
|
|
// it might be reasonable to use a std::sync::Mutex here, since we don't need to lock this
|
|
|
|
// across await points
|
2020-04-19 22:08:25 +00:00
|
|
|
pub rate_limiter: Arc<Mutex<RateLimiter>>,
|
2021-09-22 15:57:09 +00:00
|
|
|
pub rate_limit_config: RateLimitConfig,
|
2020-04-20 17:51:42 +00:00
|
|
|
}
|
2020-04-20 03:59:07 +00:00
|
|
|
|
|
|
|
#[derive(Debug, Clone)]
|
2020-04-20 17:51:42 +00:00
|
|
|
pub struct RateLimited {
|
|
|
|
rate_limiter: Arc<Mutex<RateLimiter>>,
|
2021-09-22 15:57:09 +00:00
|
|
|
rate_limit_config: RateLimitConfig,
|
2020-04-20 17:51:42 +00:00
|
|
|
type_: RateLimitType,
|
|
|
|
}
|
2020-04-20 03:59:07 +00:00
|
|
|
|
2020-04-20 17:51:42 +00:00
|
|
|
pub struct RateLimitedMiddleware<S> {
|
|
|
|
rate_limited: RateLimited,
|
2022-03-25 15:41:38 +00:00
|
|
|
service: Rc<S>,
|
2020-04-20 17:51:42 +00:00
|
|
|
}
|
2020-04-20 03:59:07 +00:00
|
|
|
|
|
|
|
impl RateLimit {
|
|
|
|
pub fn message(&self) -> RateLimited {
|
|
|
|
self.kind(RateLimitType::Message)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn post(&self) -> RateLimited {
|
|
|
|
self.kind(RateLimitType::Post)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn register(&self) -> RateLimited {
|
|
|
|
self.kind(RateLimitType::Register)
|
|
|
|
}
|
|
|
|
|
2020-08-05 16:00:00 +00:00
|
|
|
pub fn image(&self) -> RateLimited {
|
|
|
|
self.kind(RateLimitType::Image)
|
|
|
|
}
|
|
|
|
|
2021-11-11 20:40:25 +00:00
|
|
|
pub fn comment(&self) -> RateLimited {
|
|
|
|
self.kind(RateLimitType::Comment)
|
|
|
|
}
|
|
|
|
|
2022-03-29 15:46:03 +00:00
|
|
|
pub fn search(&self) -> RateLimited {
|
|
|
|
self.kind(RateLimitType::Search)
|
|
|
|
}
|
|
|
|
|
2020-04-20 03:59:07 +00:00
|
|
|
fn kind(&self, type_: RateLimitType) -> RateLimited {
|
2020-04-20 17:51:42 +00:00
|
|
|
RateLimited {
|
|
|
|
rate_limiter: self.rate_limiter.clone(),
|
2021-09-22 15:57:09 +00:00
|
|
|
rate_limit_config: self.rate_limit_config.clone(),
|
2020-04-20 17:51:42 +00:00
|
|
|
type_,
|
|
|
|
}
|
2020-04-20 03:59:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl RateLimited {
|
2022-03-25 15:41:38 +00:00
|
|
|
/// Returns true if the request passed the rate limit, false if it failed and should be rejected.
|
2022-03-27 00:29:05 +00:00
|
|
|
pub fn check(self, ip_addr: IpAddr) -> bool {
|
2020-07-01 12:54:29 +00:00
|
|
|
// Does not need to be blocking because the RwLock in settings never held across await points,
|
|
|
|
// and the operation here locks only long enough to clone
|
2021-09-22 15:57:09 +00:00
|
|
|
let rate_limit = self.rate_limit_config;
|
2020-04-20 03:59:07 +00:00
|
|
|
|
2022-03-25 15:41:38 +00:00
|
|
|
let (kind, interval) = match self.type_ {
|
|
|
|
RateLimitType::Message => (rate_limit.message, rate_limit.message_per_second),
|
|
|
|
RateLimitType::Post => (rate_limit.post, rate_limit.post_per_second),
|
|
|
|
RateLimitType::Register => (rate_limit.register, rate_limit.register_per_second),
|
|
|
|
RateLimitType::Image => (rate_limit.image, rate_limit.image_per_second),
|
|
|
|
RateLimitType::Comment => (rate_limit.comment, rate_limit.comment_per_second),
|
2022-03-29 15:46:03 +00:00
|
|
|
RateLimitType::Search => (rate_limit.search, rate_limit.search_per_second),
|
2022-03-25 15:41:38 +00:00
|
|
|
};
|
2022-03-27 00:29:05 +00:00
|
|
|
let mut limiter = self.rate_limiter.lock();
|
|
|
|
|
2022-03-25 15:41:38 +00:00
|
|
|
limiter.check_rate_limit_full(self.type_, &ip_addr, kind, interval)
|
2020-04-20 03:59:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-06 13:26:46 +00:00
|
|
|
impl<S> Transform<S, ServiceRequest> for RateLimited
|
2020-04-20 03:59:07 +00:00
|
|
|
where
|
2022-03-25 15:41:38 +00:00
|
|
|
S: Service<ServiceRequest, Response = ServiceResponse, Error = actix_web::Error> + 'static,
|
2020-04-20 03:59:07 +00:00
|
|
|
S::Future: 'static,
|
|
|
|
{
|
|
|
|
type Response = S::Response;
|
|
|
|
type Error = actix_web::Error;
|
|
|
|
type InitError = ();
|
|
|
|
type Transform = RateLimitedMiddleware<S>;
|
|
|
|
type Future = Ready<Result<Self::Transform, Self::InitError>>;
|
|
|
|
|
|
|
|
fn new_transform(&self, service: S) -> Self::Future {
|
2020-04-20 17:51:42 +00:00
|
|
|
ok(RateLimitedMiddleware {
|
|
|
|
rate_limited: self.clone(),
|
2022-03-25 15:41:38 +00:00
|
|
|
service: Rc::new(service),
|
2020-04-20 17:51:42 +00:00
|
|
|
})
|
2020-04-20 03:59:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-20 04:43:30 +00:00
|
|
|
type FutResult<T, E> = dyn Future<Output = Result<T, E>>;
|
|
|
|
|
2021-07-06 13:26:46 +00:00
|
|
|
impl<S> Service<ServiceRequest> for RateLimitedMiddleware<S>
|
2020-04-20 03:59:07 +00:00
|
|
|
where
|
2022-03-25 15:41:38 +00:00
|
|
|
S: Service<ServiceRequest, Response = ServiceResponse, Error = actix_web::Error> + 'static,
|
2020-04-20 03:59:07 +00:00
|
|
|
S::Future: 'static,
|
|
|
|
{
|
|
|
|
type Response = S::Response;
|
|
|
|
type Error = actix_web::Error;
|
2020-04-20 04:43:30 +00:00
|
|
|
type Future = Pin<Box<FutResult<Self::Response, Self::Error>>>;
|
2020-04-20 03:59:07 +00:00
|
|
|
|
2021-07-06 13:26:46 +00:00
|
|
|
fn poll_ready(&self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> {
|
2020-04-20 17:51:42 +00:00
|
|
|
self.service.poll_ready(cx)
|
2020-04-20 03:59:07 +00:00
|
|
|
}
|
|
|
|
|
2021-07-06 13:26:46 +00:00
|
|
|
fn call(&self, req: ServiceRequest) -> Self::Future {
|
2020-04-20 18:02:25 +00:00
|
|
|
let ip_addr = get_ip(&req.connection_info());
|
2020-04-20 03:59:07 +00:00
|
|
|
|
2022-03-25 15:41:38 +00:00
|
|
|
let rate_limited = self.rate_limited.clone();
|
|
|
|
let service = self.service.clone();
|
|
|
|
|
|
|
|
Box::pin(async move {
|
2022-03-27 00:29:05 +00:00
|
|
|
if rate_limited.check(ip_addr) {
|
2022-03-25 15:41:38 +00:00
|
|
|
service.call(req).await
|
|
|
|
} else {
|
|
|
|
let (http_req, _) = req.into_parts();
|
|
|
|
// if rate limit was hit, respond with http 400
|
|
|
|
Ok(ServiceResponse::new(
|
|
|
|
http_req,
|
|
|
|
HttpResponse::BadRequest().finish(),
|
|
|
|
))
|
|
|
|
}
|
|
|
|
})
|
2020-04-20 03:59:07 +00:00
|
|
|
}
|
2020-04-19 22:08:25 +00:00
|
|
|
}
|