|
5 | 5 | from .get_ratelimited_endpoint import get_ratelimited_endpoint |
6 | 6 |
|
7 | 7 |
|
8 | | -def should_ratelimit_request(route_metadata, remote_address, user, connection_manager): |
| 8 | +def should_ratelimit_request( |
| 9 | + route_metadata, remote_address, user, connection_manager, group=None |
| 10 | +): |
9 | 11 | """ |
10 | | - Checks if the request should be ratelimited or not |
| 12 | + Checks if the request should be rate-limited or not (checks user, group id & ip) |
11 | 13 | route_metadata object includes route, url and method |
12 | 14 | """ |
13 | 15 | endpoints = connection_manager.conf.get_endpoints(route_metadata) |
14 | 16 | endpoint = get_ratelimited_endpoint(endpoints, route_metadata["route"]) |
15 | 17 | if not endpoint: |
16 | 18 | return {"block": False} |
17 | 19 |
|
| 20 | + is_bypassed_ip = connection_manager.conf.is_bypassed_ip(remote_address) |
| 21 | + if is_bypassed_ip: |
| 22 | + return {"block": False} |
| 23 | + |
18 | 24 | max_requests = int(endpoint["rateLimiting"]["maxRequests"]) |
19 | 25 | windows_size_in_ms = int(endpoint["rateLimiting"]["windowSizeInMS"]) |
20 | | - is_bypassed_ip = connection_manager.conf.is_bypassed_ip(remote_address) |
21 | 26 |
|
22 | | - if is_bypassed_ip: |
| 27 | + if group: |
| 28 | + allowed = connection_manager.rate_limiter.is_allowed( |
| 29 | + get_key_for_group(endpoint, group), |
| 30 | + windows_size_in_ms, |
| 31 | + max_requests, |
| 32 | + ) |
| 33 | + if not allowed: |
| 34 | + return {"block": True, "trigger": "group"} |
| 35 | + |
| 36 | + # Do not check IP or user rate limit if group is set |
23 | 37 | return {"block": False} |
24 | 38 | if user: |
25 | | - uid = user["id"] |
26 | | - method = endpoint.get("method") |
27 | | - route = endpoint.get("route") |
28 | | - |
29 | 39 | allowed = connection_manager.rate_limiter.is_allowed( |
30 | | - f"{method}:{route}:user:{uid}", |
| 40 | + get_key_for_user(endpoint, user), |
31 | 41 | windows_size_in_ms, |
32 | 42 | max_requests, |
33 | 43 | ) |
34 | 44 | if not allowed: |
35 | 45 | return {"block": True, "trigger": "user"} |
36 | 46 | # Do not check IP rate limit if user is set |
37 | 47 | return {"block": False} |
38 | | - |
39 | 48 | if remote_address: |
40 | | - method = endpoint.get("method") |
41 | | - route = endpoint.get("route") |
42 | | - |
43 | 49 | allowed = connection_manager.rate_limiter.is_allowed( |
44 | | - f"{method}:{route}:ip:{remote_address}", |
| 50 | + get_key_for_ip(endpoint, remote_address), |
45 | 51 | windows_size_in_ms, |
46 | 52 | max_requests, |
47 | 53 | ) |
48 | 54 | if not allowed: |
49 | 55 | return {"block": True, "trigger": "ip"} |
50 | 56 |
|
51 | 57 | return {"block": False} |
| 58 | + |
| 59 | + |
| 60 | +def get_key_for_group(endpoint, group_id): |
| 61 | + method, route = endpoint.get("method"), endpoint.get("route") |
| 62 | + return f"{method}:{route}:group:{group_id}" |
| 63 | + |
| 64 | + |
| 65 | +def get_key_for_user(endpoint, user): |
| 66 | + method, route = endpoint.get("method"), endpoint.get("route") |
| 67 | + user_id = user.get("id") |
| 68 | + return f"{method}:{route}:user:{user_id}" |
| 69 | + |
| 70 | + |
| 71 | +def get_key_for_ip(endpoint, remote_address): |
| 72 | + method, route = endpoint.get("method"), endpoint.get("route") |
| 73 | + return f"{method}:{route}:ip:{remote_address}" |
0 commit comments