| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202 |
- package middleware
- import (
- "context"
- "fmt"
- "net/http"
- "time"
- "github.com/QuantumNous/new-api/common"
- "github.com/gin-gonic/gin"
- )
- var timeFormat = "2006-01-02T15:04:05.000Z"
- var inMemoryRateLimiter common.InMemoryRateLimiter
- var defNext = func(c *gin.Context) {
- c.Next()
- }
- func redisRateLimiter(c *gin.Context, maxRequestNum int, duration int64, mark string) {
- ctx := context.Background()
- rdb := common.RDB
- key := "rateLimit:" + mark + c.ClientIP()
- listLength, err := rdb.LLen(ctx, key).Result()
- if err != nil {
- fmt.Println(err.Error())
- c.Status(http.StatusInternalServerError)
- c.Abort()
- return
- }
- if listLength < int64(maxRequestNum) {
- rdb.LPush(ctx, key, time.Now().Format(timeFormat))
- rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
- } else {
- oldTimeStr, _ := rdb.LIndex(ctx, key, -1).Result()
- oldTime, err := time.Parse(timeFormat, oldTimeStr)
- if err != nil {
- fmt.Println(err)
- c.Status(http.StatusInternalServerError)
- c.Abort()
- return
- }
- nowTimeStr := time.Now().Format(timeFormat)
- nowTime, err := time.Parse(timeFormat, nowTimeStr)
- if err != nil {
- fmt.Println(err)
- c.Status(http.StatusInternalServerError)
- c.Abort()
- return
- }
- // time.Since will return negative number!
- // See: https://stackoverflow.com/questions/50970900/why-is-time-since-returning-negative-durations-on-windows
- if int64(nowTime.Sub(oldTime).Seconds()) < duration {
- rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
- c.Status(http.StatusTooManyRequests)
- c.Abort()
- return
- } else {
- rdb.LPush(ctx, key, time.Now().Format(timeFormat))
- rdb.LTrim(ctx, key, 0, int64(maxRequestNum-1))
- rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
- }
- }
- }
- func memoryRateLimiter(c *gin.Context, maxRequestNum int, duration int64, mark string) {
- key := mark + c.ClientIP()
- if !inMemoryRateLimiter.Request(key, maxRequestNum, duration) {
- c.Status(http.StatusTooManyRequests)
- c.Abort()
- return
- }
- }
- func rateLimitFactory(maxRequestNum int, duration int64, mark string) func(c *gin.Context) {
- if common.RedisEnabled {
- return func(c *gin.Context) {
- redisRateLimiter(c, maxRequestNum, duration, mark)
- }
- } else {
- // It's safe to call multi times.
- inMemoryRateLimiter.Init(common.RateLimitKeyExpirationDuration)
- return func(c *gin.Context) {
- memoryRateLimiter(c, maxRequestNum, duration, mark)
- }
- }
- }
- func GlobalWebRateLimit() func(c *gin.Context) {
- if common.GlobalWebRateLimitEnable {
- return rateLimitFactory(common.GlobalWebRateLimitNum, common.GlobalWebRateLimitDuration, "GW")
- }
- return defNext
- }
- func GlobalAPIRateLimit() func(c *gin.Context) {
- if common.GlobalApiRateLimitEnable {
- return rateLimitFactory(common.GlobalApiRateLimitNum, common.GlobalApiRateLimitDuration, "GA")
- }
- return defNext
- }
- func CriticalRateLimit() func(c *gin.Context) {
- if common.CriticalRateLimitEnable {
- return rateLimitFactory(common.CriticalRateLimitNum, common.CriticalRateLimitDuration, "CT")
- }
- return defNext
- }
- func DownloadRateLimit() func(c *gin.Context) {
- return rateLimitFactory(common.DownloadRateLimitNum, common.DownloadRateLimitDuration, "DW")
- }
- func UploadRateLimit() func(c *gin.Context) {
- return rateLimitFactory(common.UploadRateLimitNum, common.UploadRateLimitDuration, "UP")
- }
- // userRateLimitFactory creates a rate limiter keyed by authenticated user ID
- // instead of client IP, making it resistant to proxy rotation attacks.
- // Must be used AFTER authentication middleware (UserAuth).
- func userRateLimitFactory(maxRequestNum int, duration int64, mark string) func(c *gin.Context) {
- if common.RedisEnabled {
- return func(c *gin.Context) {
- userId := c.GetInt("id")
- if userId == 0 {
- c.Status(http.StatusUnauthorized)
- c.Abort()
- return
- }
- key := fmt.Sprintf("rateLimit:%s:user:%d", mark, userId)
- userRedisRateLimiter(c, maxRequestNum, duration, key)
- }
- }
- // It's safe to call multi times.
- inMemoryRateLimiter.Init(common.RateLimitKeyExpirationDuration)
- return func(c *gin.Context) {
- userId := c.GetInt("id")
- if userId == 0 {
- c.Status(http.StatusUnauthorized)
- c.Abort()
- return
- }
- key := fmt.Sprintf("%s:user:%d", mark, userId)
- if !inMemoryRateLimiter.Request(key, maxRequestNum, duration) {
- c.Status(http.StatusTooManyRequests)
- c.Abort()
- return
- }
- }
- }
- // userRedisRateLimiter is like redisRateLimiter but accepts a pre-built key
- // (to support user-ID-based keys).
- func userRedisRateLimiter(c *gin.Context, maxRequestNum int, duration int64, key string) {
- ctx := context.Background()
- rdb := common.RDB
- listLength, err := rdb.LLen(ctx, key).Result()
- if err != nil {
- fmt.Println(err.Error())
- c.Status(http.StatusInternalServerError)
- c.Abort()
- return
- }
- if listLength < int64(maxRequestNum) {
- rdb.LPush(ctx, key, time.Now().Format(timeFormat))
- rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
- } else {
- oldTimeStr, _ := rdb.LIndex(ctx, key, -1).Result()
- oldTime, err := time.Parse(timeFormat, oldTimeStr)
- if err != nil {
- fmt.Println(err)
- c.Status(http.StatusInternalServerError)
- c.Abort()
- return
- }
- nowTimeStr := time.Now().Format(timeFormat)
- nowTime, err := time.Parse(timeFormat, nowTimeStr)
- if err != nil {
- fmt.Println(err)
- c.Status(http.StatusInternalServerError)
- c.Abort()
- return
- }
- if int64(nowTime.Sub(oldTime).Seconds()) < duration {
- rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
- c.Status(http.StatusTooManyRequests)
- c.Abort()
- return
- } else {
- rdb.LPush(ctx, key, time.Now().Format(timeFormat))
- rdb.LTrim(ctx, key, 0, int64(maxRequestNum-1))
- rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
- }
- }
- }
- // SearchRateLimit returns a per-user rate limiter for search endpoints.
- // 10 requests per 60 seconds per user (by user ID, not IP).
- func SearchRateLimit() func(c *gin.Context) {
- return userRateLimitFactory(common.SearchRateLimitNum, common.SearchRateLimitDuration, "SR")
- }
|