mirror of
https://github.com/QuantumNous/new-api.git
synced 2026-03-29 23:10:35 +00:00
- Add configurable per-user token creation limit (max_user_tokens) - Sanitize search input patterns to prevent expensive queries - Add per-user search rate limiting (by user ID) - Add pagination to search endpoint with strict page size cap - Skip empty search fields instead of matching nothing - Hide internal errors from API responses - Fix Interface2String float64 formatting causing config parse failures - Add float-string fallback in config system for int/uint fields
203 lines
5.8 KiB
Go
203 lines
5.8 KiB
Go
package middleware
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/QuantumNous/new-api/common"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
var timeFormat = "2006-01-02T15:04:05.000Z"
|
|
|
|
var inMemoryRateLimiter common.InMemoryRateLimiter
|
|
|
|
var defNext = func(c *gin.Context) {
|
|
c.Next()
|
|
}
|
|
|
|
func redisRateLimiter(c *gin.Context, maxRequestNum int, duration int64, mark string) {
|
|
ctx := context.Background()
|
|
rdb := common.RDB
|
|
key := "rateLimit:" + mark + c.ClientIP()
|
|
listLength, err := rdb.LLen(ctx, key).Result()
|
|
if err != nil {
|
|
fmt.Println(err.Error())
|
|
c.Status(http.StatusInternalServerError)
|
|
c.Abort()
|
|
return
|
|
}
|
|
if listLength < int64(maxRequestNum) {
|
|
rdb.LPush(ctx, key, time.Now().Format(timeFormat))
|
|
rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
|
|
} else {
|
|
oldTimeStr, _ := rdb.LIndex(ctx, key, -1).Result()
|
|
oldTime, err := time.Parse(timeFormat, oldTimeStr)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
c.Status(http.StatusInternalServerError)
|
|
c.Abort()
|
|
return
|
|
}
|
|
nowTimeStr := time.Now().Format(timeFormat)
|
|
nowTime, err := time.Parse(timeFormat, nowTimeStr)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
c.Status(http.StatusInternalServerError)
|
|
c.Abort()
|
|
return
|
|
}
|
|
// time.Since will return negative number!
|
|
// See: https://stackoverflow.com/questions/50970900/why-is-time-since-returning-negative-durations-on-windows
|
|
if int64(nowTime.Sub(oldTime).Seconds()) < duration {
|
|
rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
|
|
c.Status(http.StatusTooManyRequests)
|
|
c.Abort()
|
|
return
|
|
} else {
|
|
rdb.LPush(ctx, key, time.Now().Format(timeFormat))
|
|
rdb.LTrim(ctx, key, 0, int64(maxRequestNum-1))
|
|
rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
|
|
}
|
|
}
|
|
}
|
|
|
|
func memoryRateLimiter(c *gin.Context, maxRequestNum int, duration int64, mark string) {
|
|
key := mark + c.ClientIP()
|
|
if !inMemoryRateLimiter.Request(key, maxRequestNum, duration) {
|
|
c.Status(http.StatusTooManyRequests)
|
|
c.Abort()
|
|
return
|
|
}
|
|
}
|
|
|
|
func rateLimitFactory(maxRequestNum int, duration int64, mark string) func(c *gin.Context) {
|
|
if common.RedisEnabled {
|
|
return func(c *gin.Context) {
|
|
redisRateLimiter(c, maxRequestNum, duration, mark)
|
|
}
|
|
} else {
|
|
// It's safe to call multi times.
|
|
inMemoryRateLimiter.Init(common.RateLimitKeyExpirationDuration)
|
|
return func(c *gin.Context) {
|
|
memoryRateLimiter(c, maxRequestNum, duration, mark)
|
|
}
|
|
}
|
|
}
|
|
|
|
func GlobalWebRateLimit() func(c *gin.Context) {
|
|
if common.GlobalWebRateLimitEnable {
|
|
return rateLimitFactory(common.GlobalWebRateLimitNum, common.GlobalWebRateLimitDuration, "GW")
|
|
}
|
|
return defNext
|
|
}
|
|
|
|
func GlobalAPIRateLimit() func(c *gin.Context) {
|
|
if common.GlobalApiRateLimitEnable {
|
|
return rateLimitFactory(common.GlobalApiRateLimitNum, common.GlobalApiRateLimitDuration, "GA")
|
|
}
|
|
return defNext
|
|
}
|
|
|
|
func CriticalRateLimit() func(c *gin.Context) {
|
|
if common.CriticalRateLimitEnable {
|
|
return rateLimitFactory(common.CriticalRateLimitNum, common.CriticalRateLimitDuration, "CT")
|
|
}
|
|
return defNext
|
|
}
|
|
|
|
func DownloadRateLimit() func(c *gin.Context) {
|
|
return rateLimitFactory(common.DownloadRateLimitNum, common.DownloadRateLimitDuration, "DW")
|
|
}
|
|
|
|
func UploadRateLimit() func(c *gin.Context) {
|
|
return rateLimitFactory(common.UploadRateLimitNum, common.UploadRateLimitDuration, "UP")
|
|
}
|
|
|
|
// userRateLimitFactory creates a rate limiter keyed by authenticated user ID
|
|
// instead of client IP, making it resistant to proxy rotation attacks.
|
|
// Must be used AFTER authentication middleware (UserAuth).
|
|
func userRateLimitFactory(maxRequestNum int, duration int64, mark string) func(c *gin.Context) {
|
|
if common.RedisEnabled {
|
|
return func(c *gin.Context) {
|
|
userId := c.GetInt("id")
|
|
if userId == 0 {
|
|
c.Status(http.StatusUnauthorized)
|
|
c.Abort()
|
|
return
|
|
}
|
|
key := fmt.Sprintf("rateLimit:%s:user:%d", mark, userId)
|
|
userRedisRateLimiter(c, maxRequestNum, duration, key)
|
|
}
|
|
}
|
|
// It's safe to call multi times.
|
|
inMemoryRateLimiter.Init(common.RateLimitKeyExpirationDuration)
|
|
return func(c *gin.Context) {
|
|
userId := c.GetInt("id")
|
|
if userId == 0 {
|
|
c.Status(http.StatusUnauthorized)
|
|
c.Abort()
|
|
return
|
|
}
|
|
key := fmt.Sprintf("%s:user:%d", mark, userId)
|
|
if !inMemoryRateLimiter.Request(key, maxRequestNum, duration) {
|
|
c.Status(http.StatusTooManyRequests)
|
|
c.Abort()
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
// userRedisRateLimiter is like redisRateLimiter but accepts a pre-built key
|
|
// (to support user-ID-based keys).
|
|
func userRedisRateLimiter(c *gin.Context, maxRequestNum int, duration int64, key string) {
|
|
ctx := context.Background()
|
|
rdb := common.RDB
|
|
listLength, err := rdb.LLen(ctx, key).Result()
|
|
if err != nil {
|
|
fmt.Println(err.Error())
|
|
c.Status(http.StatusInternalServerError)
|
|
c.Abort()
|
|
return
|
|
}
|
|
if listLength < int64(maxRequestNum) {
|
|
rdb.LPush(ctx, key, time.Now().Format(timeFormat))
|
|
rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
|
|
} else {
|
|
oldTimeStr, _ := rdb.LIndex(ctx, key, -1).Result()
|
|
oldTime, err := time.Parse(timeFormat, oldTimeStr)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
c.Status(http.StatusInternalServerError)
|
|
c.Abort()
|
|
return
|
|
}
|
|
nowTimeStr := time.Now().Format(timeFormat)
|
|
nowTime, err := time.Parse(timeFormat, nowTimeStr)
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
c.Status(http.StatusInternalServerError)
|
|
c.Abort()
|
|
return
|
|
}
|
|
if int64(nowTime.Sub(oldTime).Seconds()) < duration {
|
|
rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
|
|
c.Status(http.StatusTooManyRequests)
|
|
c.Abort()
|
|
return
|
|
} else {
|
|
rdb.LPush(ctx, key, time.Now().Format(timeFormat))
|
|
rdb.LTrim(ctx, key, 0, int64(maxRequestNum-1))
|
|
rdb.Expire(ctx, key, common.RateLimitKeyExpirationDuration)
|
|
}
|
|
}
|
|
}
|
|
|
|
// SearchRateLimit returns a per-user rate limiter for search endpoints.
|
|
// 10 requests per 60 seconds per user (by user ID, not IP).
|
|
func SearchRateLimit() func(c *gin.Context) {
|
|
return userRateLimitFactory(common.SearchRateLimitNum, common.SearchRateLimitDuration, "SR")
|
|
}
|