rate-limit.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. package middleware
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "time"
  7. "github.com/QuantumNous/new-api/common"
  8. "github.com/gin-gonic/gin"
  9. )
  10. var timeFormat = "2006-01-02T15:04:05.000Z"
  11. var inMemoryRateLimiter common.InMemoryRateLimiter
  12. var defNext = func(c *gin.Context) {
  13. c.Next()
  14. }
  15. func redisRateLimiter(c *gin.Context, maxRequestNum int, duration int64, mark string) {
  16. ctx := context.Background()
  17. rdb := common.RDB
  18. key := "rateLimit:" + mark + c.ClientIP()
  19. listLength, err := rdb.LLen(ctx, key).Result()
  20. if err != nil {
  21. fmt.Println(err.Error())
  22. c.Status(http.StatusInternalServerError)
  23. c.Abort()
  24. return
  25. }
  26. if listLength < int64(maxRequestNum) {
  27. rdb.LPush(ctx, key, time.Now().Format(timeFormat))
  28. rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
  29. } else {
  30. oldTimeStr, _ := rdb.LIndex(ctx, key, -1).Result()
  31. oldTime, err := time.Parse(timeFormat, oldTimeStr)
  32. if err != nil {
  33. fmt.Println(err)
  34. c.Status(http.StatusInternalServerError)
  35. c.Abort()
  36. return
  37. }
  38. nowTimeStr := time.Now().Format(timeFormat)
  39. nowTime, err := time.Parse(timeFormat, nowTimeStr)
  40. if err != nil {
  41. fmt.Println(err)
  42. c.Status(http.StatusInternalServerError)
  43. c.Abort()
  44. return
  45. }
  46. // time.Since will return negative number!
  47. // See: https://stackoverflow.com/questions/50970900/why-is-time-since-returning-negative-durations-on-windows
  48. if int64(nowTime.Sub(oldTime).Seconds()) < duration {
  49. rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
  50. c.Status(http.StatusTooManyRequests)
  51. c.Abort()
  52. return
  53. } else {
  54. rdb.LPush(ctx, key, time.Now().Format(timeFormat))
  55. rdb.LTrim(ctx, key, 0, int64(maxRequestNum-1))
  56. rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
  57. }
  58. }
  59. }
  60. func memoryRateLimiter(c *gin.Context, maxRequestNum int, duration int64, mark string) {
  61. key := mark + c.ClientIP()
  62. if !inMemoryRateLimiter.Request(key, maxRequestNum, duration) {
  63. c.Status(http.StatusTooManyRequests)
  64. c.Abort()
  65. return
  66. }
  67. }
  68. func rateLimitFactory(maxRequestNum int, duration int64, mark string) func(c *gin.Context) {
  69. if common.RedisEnabled {
  70. return func(c *gin.Context) {
  71. redisRateLimiter(c, maxRequestNum, duration, mark)
  72. }
  73. } else {
  74. // It's safe to call multi times.
  75. inMemoryRateLimiter.Init(common.RateLimitKeyExpirationDuration)
  76. return func(c *gin.Context) {
  77. memoryRateLimiter(c, maxRequestNum, duration, mark)
  78. }
  79. }
  80. }
  81. func GlobalWebRateLimit() func(c *gin.Context) {
  82. if common.GlobalWebRateLimitEnable {
  83. return rateLimitFactory(common.GlobalWebRateLimitNum, common.GlobalWebRateLimitDuration, "GW")
  84. }
  85. return defNext
  86. }
  87. func GlobalAPIRateLimit() func(c *gin.Context) {
  88. if common.GlobalApiRateLimitEnable {
  89. return rateLimitFactory(common.GlobalApiRateLimitNum, common.GlobalApiRateLimitDuration, "GA")
  90. }
  91. return defNext
  92. }
  93. func CriticalRateLimit() func(c *gin.Context) {
  94. if common.CriticalRateLimitEnable {
  95. return rateLimitFactory(common.CriticalRateLimitNum, common.CriticalRateLimitDuration, "CT")
  96. }
  97. return defNext
  98. }
  99. func DownloadRateLimit() func(c *gin.Context) {
  100. return rateLimitFactory(common.DownloadRateLimitNum, common.DownloadRateLimitDuration, "DW")
  101. }
  102. func UploadRateLimit() func(c *gin.Context) {
  103. return rateLimitFactory(common.UploadRateLimitNum, common.UploadRateLimitDuration, "UP")
  104. }
  105. // userRateLimitFactory creates a rate limiter keyed by authenticated user ID
  106. // instead of client IP, making it resistant to proxy rotation attacks.
  107. // Must be used AFTER authentication middleware (UserAuth).
  108. func userRateLimitFactory(maxRequestNum int, duration int64, mark string) func(c *gin.Context) {
  109. if common.RedisEnabled {
  110. return func(c *gin.Context) {
  111. userId := c.GetInt("id")
  112. if userId == 0 {
  113. c.Status(http.StatusUnauthorized)
  114. c.Abort()
  115. return
  116. }
  117. key := fmt.Sprintf("rateLimit:%s:user:%d", mark, userId)
  118. userRedisRateLimiter(c, maxRequestNum, duration, key)
  119. }
  120. }
  121. // It's safe to call multi times.
  122. inMemoryRateLimiter.Init(common.RateLimitKeyExpirationDuration)
  123. return func(c *gin.Context) {
  124. userId := c.GetInt("id")
  125. if userId == 0 {
  126. c.Status(http.StatusUnauthorized)
  127. c.Abort()
  128. return
  129. }
  130. key := fmt.Sprintf("%s:user:%d", mark, userId)
  131. if !inMemoryRateLimiter.Request(key, maxRequestNum, duration) {
  132. c.Status(http.StatusTooManyRequests)
  133. c.Abort()
  134. return
  135. }
  136. }
  137. }
  138. // userRedisRateLimiter is like redisRateLimiter but accepts a pre-built key
  139. // (to support user-ID-based keys).
  140. func userRedisRateLimiter(c *gin.Context, maxRequestNum int, duration int64, key string) {
  141. ctx := context.Background()
  142. rdb := common.RDB
  143. listLength, err := rdb.LLen(ctx, key).Result()
  144. if err != nil {
  145. fmt.Println(err.Error())
  146. c.Status(http.StatusInternalServerError)
  147. c.Abort()
  148. return
  149. }
  150. if listLength < int64(maxRequestNum) {
  151. rdb.LPush(ctx, key, time.Now().Format(timeFormat))
  152. rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
  153. } else {
  154. oldTimeStr, _ := rdb.LIndex(ctx, key, -1).Result()
  155. oldTime, err := time.Parse(timeFormat, oldTimeStr)
  156. if err != nil {
  157. fmt.Println(err)
  158. c.Status(http.StatusInternalServerError)
  159. c.Abort()
  160. return
  161. }
  162. nowTimeStr := time.Now().Format(timeFormat)
  163. nowTime, err := time.Parse(timeFormat, nowTimeStr)
  164. if err != nil {
  165. fmt.Println(err)
  166. c.Status(http.StatusInternalServerError)
  167. c.Abort()
  168. return
  169. }
  170. if int64(nowTime.Sub(oldTime).Seconds()) < duration {
  171. rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
  172. c.Status(http.StatusTooManyRequests)
  173. c.Abort()
  174. return
  175. } else {
  176. rdb.LPush(ctx, key, time.Now().Format(timeFormat))
  177. rdb.LTrim(ctx, key, 0, int64(maxRequestNum-1))
  178. rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
  179. }
  180. }
  181. }
  182. // SearchRateLimit returns a per-user rate limiter for search endpoints.
  183. // 10 requests per 60 seconds per user (by user ID, not IP).
  184. func SearchRateLimit() func(c *gin.Context) {
  185. return userRateLimitFactory(common.SearchRateLimitNum, common.SearchRateLimitDuration, "SR")
  186. }