-
Notifications
You must be signed in to change notification settings - Fork 480
/
ratelimit_middleware.go
109 lines (91 loc) · 3.5 KB
/
ratelimit_middleware.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
/*
Copyright 2021 The Dapr Authors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package ratelimit
import (
"context"
"fmt"
"net/http"
"reflect"
tollbooth "github.com/didip/tollbooth/v7"
libstring "github.com/didip/tollbooth/v7/libstring"
contribMetadata "github.com/dapr/components-contrib/metadata"
"github.com/dapr/components-contrib/middleware"
"github.com/dapr/kit/logger"
)
// Metadata is the ratelimit middleware config.
type rateLimitMiddlewareMetadata struct {
MaxRequestsPerSecond float64 `json:"maxRequestsPerSecond"`
}
const (
maxRequestsPerSecondKey = "maxRequestsPerSecond"
// Defaults.
defaultMaxRequestsPerSecond = 100
)
// NewRateLimitMiddleware returns a new ratelimit middleware.
func NewRateLimitMiddleware(_ logger.Logger) middleware.Middleware {
return &Middleware{}
}
// Middleware is an ratelimit middleware.
type Middleware struct{}
// GetHandler returns the HTTP handler provided by the middleware.
func (m *Middleware) GetHandler(_ context.Context, metadata middleware.Metadata) (func(next http.Handler) http.Handler, error) {
meta, err := m.getNativeMetadata(metadata)
if err != nil {
return nil, err
}
limiter := tollbooth.NewLimiter(meta.MaxRequestsPerSecond, nil)
return func(next http.Handler) http.Handler {
// Adapted from toolbooth.LimitHandler
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
// The tollbooth library requires a remote IP. If this isn't present in the request's headers, then we need to set a value for X-Forwarded-For or the rate limiter won't work
remoteIP := libstring.RemoteIP(limiter.GetIPLookups(), limiter.GetForwardedForIndexFromBehind(), r)
remoteIP = libstring.CanonicalizeIP(remoteIP)
if remoteIP == "" {
// Forcefully set a remote IP
r.Header.Set("X-Forwarded-For", "0.0.0.0")
}
httpError := tollbooth.LimitByRequest(limiter, w, r)
if httpError != nil {
limiter.ExecOnLimitReached(w, r)
if limiter.GetOverrideDefaultResponseWriter() {
return
}
w.Header().Add("Content-Type", limiter.GetMessageContentType())
w.WriteHeader(httpError.StatusCode)
w.Write([]byte(httpError.Message))
return
}
// There's no rate-limit error, serve the next handler.
next.ServeHTTP(w, r)
})
}, nil
}
func (m *Middleware) getNativeMetadata(metadata middleware.Metadata) (*rateLimitMiddlewareMetadata, error) {
middlewareMetadata := rateLimitMiddlewareMetadata{
MaxRequestsPerSecond: defaultMaxRequestsPerSecond,
}
err := contribMetadata.DecodeMetadata(metadata.Properties, &middlewareMetadata)
if err != nil {
return nil, err
}
if middlewareMetadata.MaxRequestsPerSecond <= 0 {
return nil, fmt.Errorf("metadata property %s must be a positive value", maxRequestsPerSecondKey)
}
return &middlewareMetadata, nil
}
func (m *Middleware) GetComponentMetadata() map[string]string {
metadataStruct := rateLimitMiddlewareMetadata{}
metadataInfo := map[string]string{}
contribMetadata.GetMetadataInfoFromStructType(reflect.TypeOf(metadataStruct), &metadataInfo, contribMetadata.MiddlewareType)
return metadataInfo
}