1
0
mirror of https://github.com/actix/actix-extras.git synced 2025-02-17 08:33:30 +01:00

Limitation: custom key from closure (#281)

Co-authored-by: Rob Ede <robjtede@icloud.com>
This commit is contained in:
Raphael C 2022-09-11 01:02:54 +02:00 committed by GitHub
parent a623c50e9c
commit 32313c0af6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 171 additions and 57 deletions

View File

@ -1,6 +1,7 @@
# Changes # Changes
## Unreleased - 2022-xx-xx ## Unreleased - 2022-xx-xx
- Add `Builder::key_by` for setting a custom rate limit key function.
- Implement `Default` for `RateLimiter`. - Implement `Default` for `RateLimiter`.
- `RateLimiter` is marked `#[non_exhaustive]`; use `RateLimiter::default()` instead. - `RateLimiter` is marked `#[non_exhaustive]`; use `RateLimiter::default()` instead.
- In the middleware errors from the count function are matched and respond with `INTERNAL_SERVER_ERROR` if it's an unexpected error, instead of the default `TOO_MANY_REQUESTS`. - In the middleware errors from the count function are matched and respond with `INTERNAL_SERVER_ERROR` if it's an unexpected error, instead of the default `TOO_MANY_REQUESTS`.

View File

@ -12,10 +12,13 @@ repository = "https://github.com/actix/actix-extras.git"
license = "MIT OR Apache-2.0" license = "MIT OR Apache-2.0"
edition = "2018" edition = "2018"
[features]
default = ["session"]
session = ["actix-session"]
[dependencies] [dependencies]
actix-session = "0.7"
actix-utils = "3" actix-utils = "3"
actix-web = { version = "4", default-features = false } actix-web = { version = "4", features = ["cookies"] }
chrono = "0.4" chrono = "0.4"
derive_more = "0.99.5" derive_more = "0.99.5"
@ -23,6 +26,9 @@ log = "0.4"
redis = { version = "0.21", default-features = false, features = ["tokio-comp"] } redis = { version = "0.21", default-features = false, features = ["tokio-comp"] }
time = "0.3" time = "0.3"
# session
actix-session = { version = "0.7", optional = true }
[dev-dependencies] [dev-dependencies]
actix-web = "4" actix-web = "4"
static_assertions = "1" static_assertions = "1"

View File

@ -17,9 +17,10 @@ actix-limitation = "0.3"
``` ```
```rust ```rust
use std::time::Duration;
use actix_web::{get, web, App, HttpServer, Responder};
use actix_limitation::{Limiter, RateLimiter}; use actix_limitation::{Limiter, RateLimiter};
use actix_session::SessionExt as _;
use actix_web::{dev::ServiceRequest, get, web, App, HttpServer, Responder};
use std::{sync::Arc, time::Duration};
#[get("/{id}/{name}")] #[get("/{id}/{name}")]
async fn index(info: web::Path<(u32, String)>) -> impl Responder { async fn index(info: web::Path<(u32, String)>) -> impl Responder {
@ -29,22 +30,24 @@ async fn index(info: web::Path<(u32, String)>) -> impl Responder {
#[actix_web::main] #[actix_web::main]
async fn main() -> std::io::Result<()> { async fn main() -> std::io::Result<()> {
let limiter = web::Data::new( let limiter = web::Data::new(
Limiter::build("redis://127.0.0.1") Limiter::builder("redis://127.0.0.1")
.cookie_name("session-id".to_owned()) .key_by(|req: &ServiceRequest| {
.session_key("rate-api-id".to_owned()) req.get_session()
.get(&"session-id")
.unwrap_or_else(|_| req.cookie(&"rate-api-id").map(|c| c.to_string()))
})
.limit(5000) .limit(5000)
.period(Duration::from_secs(3600)) // 60 minutes .period(Duration::from_secs(3600)) // 60 minutes
.finish() .build()
.expect("Can't build actix-limiter"), .unwrap(),
); );
HttpServer::new(move || { HttpServer::new(move || {
App::new() App::new()
.wrap(RateLimiter) .wrap(RateLimiter::default())
.app_data(limiter.clone()) .app_data(limiter.clone())
.service(index) .service(index)
}) })
.bind("127.0.0.1:8080")? .bind(("127.0.0.1", 8080))?
.run() .run()
.await .await
} }

View File

@ -1,8 +1,11 @@
use std::{borrow::Cow, time::Duration}; use std::{borrow::Cow, sync::Arc, time::Duration};
#[cfg(feature = "session")]
use actix_session::SessionExt as _;
use actix_web::dev::ServiceRequest;
use redis::Client; use redis::Client;
use crate::{errors::Error, Limiter}; use crate::{errors::Error, GetArcBoxKeyFn, Limiter};
/// Rate limiter builder. /// Rate limiter builder.
#[derive(Debug)] #[derive(Debug)]
@ -10,7 +13,9 @@ pub struct Builder {
pub(crate) redis_url: String, pub(crate) redis_url: String,
pub(crate) limit: usize, pub(crate) limit: usize,
pub(crate) period: Duration, pub(crate) period: Duration,
pub(crate) get_key_fn: Option<GetArcBoxKeyFn>,
pub(crate) cookie_name: Cow<'static, str>, pub(crate) cookie_name: Cow<'static, str>,
#[cfg(feature = "session")]
pub(crate) session_key: Cow<'static, str>, pub(crate) session_key: Cow<'static, str>,
} }
@ -27,14 +32,38 @@ impl Builder {
self self
} }
/// Set name of cookie to be sent. /// Sets rate limit key derivation function.
///
/// Should not be used in combination with `cookie_name` or `session_key` as they conflict.
pub fn key_by<F>(&mut self, resolver: F) -> &mut Self
where
F: Fn(&ServiceRequest) -> Option<String> + Send + Sync + 'static,
{
self.get_key_fn = Some(Arc::new(resolver));
self
}
/// Sets name of cookie to be sent.
///
/// This method should not be used in combination of `key_by` as they conflict.
#[deprecated = "Prefer `key_by`."]
pub fn cookie_name(&mut self, cookie_name: impl Into<Cow<'static, str>>) -> &mut Self { pub fn cookie_name(&mut self, cookie_name: impl Into<Cow<'static, str>>) -> &mut Self {
if self.get_key_fn.is_some() {
panic!("This method should not be used in combination of get_key as they overwrite each other")
}
self.cookie_name = cookie_name.into(); self.cookie_name = cookie_name.into();
self self
} }
/// Set session key to be used in backend. /// Sets session key to be used in backend.
///
/// This method should not be used in combination of `key_by` as they conflict.
#[deprecated = "Prefer `key_by`."]
#[cfg(feature = "session")]
pub fn session_key(&mut self, session_key: impl Into<Cow<'static, str>>) -> &mut Self { pub fn session_key(&mut self, session_key: impl Into<Cow<'static, str>>) -> &mut Self {
if self.get_key_fn.is_some() {
panic!("This method should not be used in combination of get_key as they overwrite each other")
}
self.session_key = session_key.into(); self.session_key = session_key.into();
self self
} }
@ -43,13 +72,35 @@ impl Builder {
/// ///
/// Note that this method will connect to the Redis server to test its connection which is a /// Note that this method will connect to the Redis server to test its connection which is a
/// **synchronous** operation. /// **synchronous** operation.
pub fn build(&self) -> Result<Limiter, Error> { pub fn build(&mut self) -> Result<Limiter, Error> {
let get_key = if let Some(resolver) = self.get_key_fn.clone() {
resolver
} else {
let cookie_name = self.cookie_name.clone();
#[cfg(feature = "session")]
let session_key = self.session_key.clone();
let closure: GetArcBoxKeyFn = Arc::new(Box::new(move |req: &ServiceRequest| {
#[cfg(feature = "session")]
let res = req
.get_session()
.get(&session_key)
.unwrap_or_else(|_| req.cookie(&cookie_name).map(|c| c.to_string()));
#[cfg(not(feature = "session"))]
let res = req.cookie(&cookie_name).map(|c| c.to_string());
res
}));
closure
};
Ok(Limiter { Ok(Limiter {
client: Client::open(self.redis_url.as_str())?, client: Client::open(self.redis_url.as_str())?,
limit: self.limit, limit: self.limit,
period: self.period, period: self.period,
cookie_name: self.cookie_name.clone(), get_key_fn: get_key,
session_key: self.session_key.clone(),
}) })
} }
} }
@ -66,13 +117,16 @@ mod tests {
redis_url: redis_url.to_owned(), redis_url: redis_url.to_owned(),
limit: 100, limit: 100,
period, period,
get_key_fn: Some(Arc::new(|_| None)),
cookie_name: Cow::Owned("session".to_string()), cookie_name: Cow::Owned("session".to_string()),
#[cfg(feature = "session")]
session_key: Cow::Owned("rate-api".to_string()), session_key: Cow::Owned("rate-api".to_string()),
}; };
assert_eq!(builder.redis_url, redis_url); assert_eq!(builder.redis_url, redis_url);
assert_eq!(builder.limit, 100); assert_eq!(builder.limit, 100);
assert_eq!(builder.period, period); assert_eq!(builder.period, period);
#[cfg(feature = "session")]
assert_eq!(builder.session_key, "rate-api"); assert_eq!(builder.session_key, "rate-api");
assert_eq!(builder.cookie_name, "session"); assert_eq!(builder.cookie_name, "session");
} }
@ -85,22 +139,16 @@ mod tests {
redis_url: redis_url.to_owned(), redis_url: redis_url.to_owned(),
limit: 100, limit: 100,
period: Duration::from_secs(10), period: Duration::from_secs(10),
session_key: Cow::Borrowed("key"), get_key_fn: Some(Arc::new(|_| None)),
cookie_name: Cow::Borrowed("sid"), cookie_name: Cow::Borrowed("sid"),
#[cfg(feature = "session")]
session_key: Cow::Borrowed("key"),
}; };
let limiter = builder let limiter = builder.limit(200).period(period).build().unwrap();
.limit(200)
.period(period)
.cookie_name("session".to_string())
.session_key("rate-api".to_string())
.build()
.unwrap();
assert_eq!(limiter.limit, 200); assert_eq!(limiter.limit, 200);
assert_eq!(limiter.period, period); assert_eq!(limiter.period, period);
assert_eq!(limiter.session_key, "rate-api");
assert_eq!(limiter.cookie_name, "session");
} }
#[test] #[test]
@ -112,8 +160,10 @@ mod tests {
redis_url: redis_url.to_owned(), redis_url: redis_url.to_owned(),
limit: 100, limit: 100,
period: Duration::from_secs(10), period: Duration::from_secs(10),
session_key: Cow::Borrowed("key"), get_key_fn: Some(Arc::new(|_| None)),
cookie_name: Cow::Borrowed("sid"), cookie_name: Cow::Borrowed("sid"),
#[cfg(feature = "session")]
session_key: Cow::Borrowed("key"),
}; };
builder.limit(200).period(period).build().unwrap(); builder.limit(200).period(period).build().unwrap();

View File

@ -7,8 +7,9 @@
//! ``` //! ```
//! //!
//! ```no_run //! ```no_run
//! use std::time::Duration; //! use std::{sync::Arc, time::Duration};
//! use actix_web::{get, web, App, HttpServer, Responder}; //! use actix_web::{dev::ServiceRequest, get, web, App, HttpServer, Responder};
//! use actix_session::SessionExt as _;
//! use actix_limitation::{Limiter, RateLimiter}; //! use actix_limitation::{Limiter, RateLimiter};
//! //!
//! #[get("/{id}/{name}")] //! #[get("/{id}/{name}")]
@ -20,8 +21,11 @@
//! async fn main() -> std::io::Result<()> { //! async fn main() -> std::io::Result<()> {
//! let limiter = web::Data::new( //! let limiter = web::Data::new(
//! Limiter::builder("redis://127.0.0.1") //! Limiter::builder("redis://127.0.0.1")
//! .cookie_name("session-id".to_owned()) //! .key_by(|req: &ServiceRequest| {
//! .session_key("rate-api-id".to_owned()) //! req.get_session()
//! .get(&"session-id")
//! .unwrap_or_else(|_| req.cookie(&"rate-api-id").map(|c| c.to_string()))
//! })
//! .limit(5000) //! .limit(5000)
//! .period(Duration::from_secs(3600)) // 60 minutes //! .period(Duration::from_secs(3600)) // 60 minutes
//! .build() //! .build()
@ -46,8 +50,9 @@
#![doc(html_logo_url = "https://actix.rs/img/logo.png")] #![doc(html_logo_url = "https://actix.rs/img/logo.png")]
#![doc(html_favicon_url = "https://actix.rs/favicon.ico")] #![doc(html_favicon_url = "https://actix.rs/favicon.ico")]
use std::{borrow::Cow, time::Duration}; use std::{borrow::Cow, fmt, sync::Arc, time::Duration};
use actix_web::dev::ServiceRequest;
use redis::Client; use redis::Client;
mod builder; mod builder;
@ -70,16 +75,34 @@ pub const DEFAULT_PERIOD_SECS: u64 = 3600;
pub const DEFAULT_COOKIE_NAME: &str = "sid"; pub const DEFAULT_COOKIE_NAME: &str = "sid";
/// Default session key. /// Default session key.
#[cfg(feature = "session")]
pub const DEFAULT_SESSION_KEY: &str = "rate-api-id"; pub const DEFAULT_SESSION_KEY: &str = "rate-api-id";
/// Helper trait to impl Debug on GetKeyFn type
trait GetKeyFnT: Fn(&ServiceRequest) -> Option<String> {}
impl<T> GetKeyFnT for T where T: Fn(&ServiceRequest) -> Option<String> {}
/// Get key function type with auto traits
type GetKeyFn = dyn GetKeyFnT + Send + Sync;
/// Get key resolver function type
impl fmt::Debug for GetKeyFn {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
write!(f, "GetKeyFn")
}
}
/// Wrapped Get key function Trait
type GetArcBoxKeyFn = Arc<GetKeyFn>;
/// Rate limiter. /// Rate limiter.
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
pub struct Limiter { pub struct Limiter {
client: Client, client: Client,
limit: usize, limit: usize,
period: Duration, period: Duration,
cookie_name: Cow<'static, str>, get_key_fn: GetArcBoxKeyFn,
session_key: Cow<'static, str>,
} }
impl Limiter { impl Limiter {
@ -93,7 +116,9 @@ impl Limiter {
redis_url: redis_url.into(), redis_url: redis_url.into(),
limit: DEFAULT_REQUEST_LIMIT, limit: DEFAULT_REQUEST_LIMIT,
period: Duration::from_secs(DEFAULT_PERIOD_SECS), period: Duration::from_secs(DEFAULT_PERIOD_SECS),
get_key_fn: None,
cookie_name: Cow::Borrowed(DEFAULT_COOKIE_NAME), cookie_name: Cow::Borrowed(DEFAULT_COOKIE_NAME),
#[cfg(feature = "session")]
session_key: Cow::Borrowed(DEFAULT_SESSION_KEY), session_key: Cow::Borrowed(DEFAULT_SESSION_KEY),
} }
} }
@ -146,14 +171,12 @@ mod tests {
#[test] #[test]
fn test_create_limiter() { fn test_create_limiter() {
let builder = Limiter::builder("redis://127.0.0.1:6379/1"); let mut builder = Limiter::builder("redis://127.0.0.1:6379/1");
let limiter = builder.build(); let limiter = builder.build();
assert!(limiter.is_ok()); assert!(limiter.is_ok());
let limiter = limiter.unwrap(); let limiter = limiter.unwrap();
assert_eq!(limiter.limit, 5000); assert_eq!(limiter.limit, 5000);
assert_eq!(limiter.period, Duration::from_secs(3600)); assert_eq!(limiter.period, Duration::from_secs(3600));
assert_eq!(limiter.cookie_name, DEFAULT_COOKIE_NAME);
assert_eq!(limiter.session_key, DEFAULT_SESSION_KEY);
} }
} }

View File

@ -1,6 +1,5 @@
use std::{future::Future, pin::Pin, rc::Rc}; use std::{future::Future, pin::Pin, rc::Rc};
use actix_session::SessionExt as _;
use actix_utils::future::{ok, Ready}; use actix_utils::future::{ok, Ready};
use actix_web::{ use actix_web::{
body::EitherBody, body::EitherBody,
@ -61,25 +60,18 @@ where
.expect("web::Data<Limiter> should be set in app data for RateLimiter middleware") .expect("web::Data<Limiter> should be set in app data for RateLimiter middleware")
.clone(); .clone();
let key = req.get_session().get(&limiter.session_key).unwrap_or(None); let key = (limiter.get_key_fn)(&req);
let service = Rc::clone(&self.service); let service = Rc::clone(&self.service);
let key = match key { let key = match key {
Some(key) => key, Some(key) => key,
None => { None => {
let fallback = req.cookie(&limiter.cookie_name).map(|c| c.to_string()); return Box::pin(async move {
service
match fallback { .call(req)
Some(key) => key, .await
None => { .map(ServiceResponse::map_into_left_body)
return Box::pin(async move { });
service
.call(req)
.await
.map(ServiceResponse::map_into_left_body)
});
}
}
} }
}; };

View File

@ -1,9 +1,12 @@
use actix_limitation::{Error, Limiter}; use std::time::Duration;
use actix_limitation::{Error, Limiter, RateLimiter};
use actix_web::{dev::ServiceRequest, http::StatusCode, test, web, App, HttpRequest, HttpResponse};
use uuid::Uuid; use uuid::Uuid;
#[test] #[test]
#[should_panic = "Redis URL did not parse"] #[should_panic = "Redis URL did not parse"]
fn test_create_limiter_error() { async fn test_create_limiter_error() {
Limiter::builder("127.0.0.1").build().unwrap(); Limiter::builder("127.0.0.1").build().unwrap();
} }
@ -51,3 +54,39 @@ async fn test_limiter_count_error() -> Result<(), Error> {
Ok(()) Ok(())
} }
#[actix_web::test]
async fn test_limiter_key_by() -> Result<(), Error> {
let cooldown_period = Duration::from_secs(1);
let limiter = Limiter::builder("redis://127.0.0.1:6379/3")
.limit(2)
.period(cooldown_period)
.key_by(|_: &ServiceRequest| Some("fix_key".to_string()))
.build()
.unwrap();
let app = test::init_service(
App::new()
.wrap(RateLimiter::default())
.app_data(web::Data::new(limiter))
.route(
"/",
web::get().to(|_: HttpRequest| async { HttpResponse::Ok().body("ok") }),
),
)
.await;
for _ in 1..2 {
for index in 1..4 {
let req = test::TestRequest::default().to_request();
let resp = test::call_service(&app, req).await;
if index <= 2 {
assert!(resp.status().is_success());
} else {
assert_eq!(resp.status(), StatusCode::TOO_MANY_REQUESTS);
}
}
std::thread::sleep(cooldown_period);
}
Ok(())
}