mirror of
https://github.com/mattermost/mattermost.git
synced 2026-04-13 13:08:56 -04:00
Some checks are pending
API / build (push) Waiting to run
Server CI / Compute Go Version (push) Waiting to run
Server CI / Check mocks (push) Blocked by required conditions
Server CI / Check go mod tidy (push) Blocked by required conditions
Server CI / check-style (push) Blocked by required conditions
Server CI / Check serialization methods for hot structs (push) Blocked by required conditions
Server CI / Vet API (push) Blocked by required conditions
Server CI / Check migration files (push) Blocked by required conditions
Server CI / Generate email templates (push) Blocked by required conditions
Server CI / Check store layers (push) Blocked by required conditions
Server CI / Check mmctl docs (push) Blocked by required conditions
Server CI / Postgres with binary parameters (push) Blocked by required conditions
Server CI / Postgres (push) Blocked by required conditions
Server CI / Postgres (FIPS) (push) Blocked by required conditions
Server CI / Generate Test Coverage (push) Blocked by required conditions
Server CI / Run mmctl tests (push) Blocked by required conditions
Server CI / Run mmctl tests (FIPS) (push) Blocked by required conditions
Server CI / Build mattermost server app (push) Blocked by required conditions
Web App CI / check-lint (push) Waiting to run
Web App CI / check-i18n (push) Blocked by required conditions
Web App CI / check-external-links (push) Blocked by required conditions
Web App CI / check-types (push) Blocked by required conditions
Web App CI / test (platform) (push) Blocked by required conditions
Web App CI / test (mattermost-redux) (push) Blocked by required conditions
Web App CI / test (channels shard 1/4) (push) Blocked by required conditions
Web App CI / test (channels shard 2/4) (push) Blocked by required conditions
Web App CI / test (channels shard 3/4) (push) Blocked by required conditions
Web App CI / test (channels shard 4/4) (push) Blocked by required conditions
Web App CI / upload-coverage (push) Blocked by required conditions
Web App CI / build (push) Blocked by required conditions
Co-authored-by: Claude <noreply@anthropic.com> Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com> Co-authored-by: Mattermost Build <build@mattermost.com>
132 lines
3.9 KiB
Go
132 lines
3.9 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package app
|
|
|
|
import (
|
|
"context"
|
|
"math"
|
|
"net/http"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/throttled/throttled/v2"
|
|
"github.com/throttled/throttled/v2/store/memstore"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/mattermost/mattermost/server/public/shared/i18n"
|
|
"github.com/mattermost/mattermost/server/public/shared/mlog"
|
|
"github.com/mattermost/mattermost/server/v8/channels/utils"
|
|
)
|
|
|
|
type RateLimiter struct {
|
|
throttledRateLimiter *throttled.GCRARateLimiterCtx
|
|
useAuth bool
|
|
useIP bool
|
|
header string
|
|
trustedProxyIPHeader []string
|
|
}
|
|
|
|
func NewRateLimiter(settings *model.RateLimitSettings, trustedProxyIPHeader []string) (*RateLimiter, error) {
|
|
store, err := memstore.NewCtx(*settings.MemoryStoreSize)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, i18n.T("api.server.start_server.rate_limiting_memory_store"))
|
|
}
|
|
|
|
quota := throttled.RateQuota{
|
|
MaxRate: throttled.PerSec(*settings.PerSec),
|
|
MaxBurst: *settings.MaxBurst,
|
|
}
|
|
|
|
throttledRateLimiter, err := throttled.NewGCRARateLimiterCtx(store, quota)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, i18n.T("api.server.start_server.rate_limiting_rate_limiter"))
|
|
}
|
|
|
|
return &RateLimiter{
|
|
throttledRateLimiter: throttledRateLimiter,
|
|
useAuth: *settings.VaryByUser,
|
|
useIP: *settings.VaryByRemoteAddr,
|
|
header: settings.VaryByHeader,
|
|
trustedProxyIPHeader: trustedProxyIPHeader,
|
|
}, nil
|
|
}
|
|
|
|
func (rl *RateLimiter) GenerateKey(r *http.Request) string {
|
|
key := ""
|
|
|
|
if rl.useAuth {
|
|
token, tokenLocation := ParseAuthTokenFromRequest(r)
|
|
if tokenLocation != TokenLocationNotFound {
|
|
key += token
|
|
} else if rl.useIP { // If we don't find an authentication token and IP based is enabled, fall back to IP
|
|
key += utils.GetIPAddress(r, rl.trustedProxyIPHeader)
|
|
}
|
|
} else if rl.useIP { // Only if Auth based is not enabed do we use a plain IP based
|
|
key += utils.GetIPAddress(r, rl.trustedProxyIPHeader)
|
|
}
|
|
|
|
// Note that most of the time the user won't have to set this because the utils.GetIPAddress above tries the
|
|
// most common headers anyway.
|
|
if rl.header != "" {
|
|
key += strings.ToLower(r.Header.Get(rl.header))
|
|
}
|
|
|
|
return key
|
|
}
|
|
|
|
func (rl *RateLimiter) RateLimitWriter(ctx context.Context, key string, w http.ResponseWriter) bool {
|
|
limited, context, err := rl.throttledRateLimiter.RateLimitCtx(ctx, key, 1)
|
|
if err != nil {
|
|
mlog.Error("Internal server error when rate limiting. Rate Limiting broken.", mlog.Err(err))
|
|
return false
|
|
}
|
|
|
|
setRateLimitHeaders(w, context)
|
|
|
|
if limited {
|
|
mlog.Debug("Denied due to throttling settings code=429", mlog.String("key", key))
|
|
http.Error(w, "limit exceeded", http.StatusTooManyRequests)
|
|
}
|
|
|
|
return limited
|
|
}
|
|
|
|
func (rl *RateLimiter) UserIdRateLimit(ctx context.Context, userID string, w http.ResponseWriter) bool {
|
|
if rl.useAuth {
|
|
return rl.RateLimitWriter(ctx, userID, w)
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (rl *RateLimiter) RateLimitHandler(wrappedHandler http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
key := rl.GenerateKey(r)
|
|
|
|
if !rl.RateLimitWriter(r.Context(), key, w) {
|
|
wrappedHandler.ServeHTTP(w, r)
|
|
}
|
|
})
|
|
}
|
|
|
|
// Copied from https://github.com/throttled/throttled http.go
|
|
func setRateLimitHeaders(w http.ResponseWriter, context throttled.RateLimitResult) {
|
|
if v := context.Limit; v >= 0 {
|
|
w.Header().Add("X-RateLimit-Limit", strconv.Itoa(v))
|
|
}
|
|
|
|
if v := context.Remaining; v >= 0 {
|
|
w.Header().Add("X-RateLimit-Remaining", strconv.Itoa(v))
|
|
}
|
|
|
|
if v := context.ResetAfter; v >= 0 {
|
|
vi := int(math.Ceil(v.Seconds()))
|
|
w.Header().Add("X-RateLimit-Reset", strconv.Itoa(vi))
|
|
}
|
|
|
|
if v := context.RetryAfter; v >= 0 {
|
|
vi := int(math.Ceil(v.Seconds()))
|
|
w.Header().Add("Retry-After", strconv.Itoa(vi))
|
|
}
|
|
}
|