Compare commits

...

17 Commits

Author SHA1 Message Date
anatawa12 4c6c35b23a
Merge bb921297c7 into 837a8e15d8 2024-09-11 17:05:03 +09:00
Sayamame-beans bb921297c7
Merge branch 'develop' into reimplement-rate-limit 2024-07-17 19:44:52 +09:00
syuilo 0265d913e5
Merge branch 'develop' into reimplement-rate-limit 2024-06-22 19:42:11 +09:00
Kisaragi 31daf10f87
fix lint error 2024-06-22 14:32:39 +09:00
anatawa12 d8941558c3
fix: レートリミットのfactorが二回適用されて二乗の効果がある問題を修正 2024-06-22 13:40:23 +09:00
anatawa12 e77bcf5ff7
Merge branch 'develop' into reimplement-rate-limit 2024-06-22 13:39:48 +09:00
anatawa12 f9dd3aca78
refactor: return rate limit instead of throwing an object 2024-06-22 13:34:52 +09:00
anatawa12 fce656b5e9
Merge branch 'develop' into reimplement-rate-limit 2024-06-15 11:08:06 +09:00
anatawa12 0ef7f14fa9
refactor: remove unnecessary max/min function 2024-06-14 17:49:52 +09:00
anatawa12 4af9c90d12
refactor: remove unnecessary return in min/max function 2024-06-14 17:49:52 +09:00
anatawa12 3eb1875804
refactor: check if there is rate limit inside min/max function 2024-06-14 17:49:52 +09:00
anatawa12 f72c768407
refactor: do not check long term limit inside min 2024-06-14 17:49:52 +09:00
anatawa12 b3561ce425
refactor: reimplement limit with async 2024-06-14 17:49:52 +09:00
anatawa12 1d6d90d62d
refactor: reimplement max/min with async 2024-06-14 17:49:52 +09:00
anatawa12 d8844aed6f
refactor: wrap ratelimiter with promise 2024-06-14 17:49:52 +09:00
anatawa12 28c8d318e1
fix: long term / short term limitがないときでもそれぞれ用のnew Limiterとlimiter.getが呼ばれる問題 2024-06-14 17:49:51 +09:00
anatawa12 03c2919b69
fix rate limit check never ends 2024-06-14 15:36:58 +09:00
4 changed files with 65 additions and 81 deletions

View File

@ -141,6 +141,7 @@
- Fix: アンテナ・クリップ・リスト・ウェブフックがロールポリシーの上限より一つ多く作れてしまうのを修正 (#14036)
- Fix: notRespondingSinceが実装される前に不通になったインスタンスが自動的に配信停止にならない (#14059)
- Fix: FTT有効時、タイムライン用エンドポイントで`sinceId`にキャッシュ内最古のものより古いものを指定した場合に正しく結果が返ってこない問題を修正
- Fix: レートリミットのfactorが二回適用されて二乗の効果がある問題を修正 (#13997)
- Fix: 自分以外のクリップ内のノート個数が見えることがあるのを修正
- Fix: 空文字列のリアクションはフォールバックされるように
- Fix: リノートにリアクションできないように

View File

@ -326,19 +326,15 @@ export class ApiCallService implements OnApplicationShutdown {
if (factor > 0) {
// Rate limit
await this.rateLimiterService.limit(limit as IEndpointMeta['limit'] & { key: NonNullable<string> }, limitActor, factor).catch(err => {
if ('info' in err) {
// errはLimiter.LimiterInfoであることが期待される
const rateLimit = await this.rateLimiterService.limit(limit as IEndpointMeta['limit'] & { key: NonNullable<string> }, limitActor, factor);
if (rateLimit != null) {
throw new ApiError({
message: 'Rate limit exceeded. Please try again later.',
code: 'RATE_LIMIT_EXCEEDED',
id: 'd5826d14-3982-4d2e-8011-b9e9f02499ef',
httpStatusCode: 429,
}, err.info);
} else {
throw new TypeError('information must be a rate-limiter information.');
}, rateLimit.info);
}
});
}
}

View File

@ -12,6 +12,14 @@ import { LoggerService } from '@/core/LoggerService.js';
import { bindThis } from '@/decorators.js';
import type { IEndpointMeta } from './endpoints.js';
type RateLimitInfo = {
code: 'BRIEF_REQUEST_INTERVAL',
info: Limiter.LimiterInfo,
} | {
code: 'RATE_LIMIT_EXCEEDED',
info: Limiter.LimiterInfo,
}
@Injectable()
export class RateLimiterService {
private logger: Logger;
@ -31,77 +39,57 @@ export class RateLimiterService {
}
@bindThis
public limit(limitation: IEndpointMeta['limit'] & { key: NonNullable<string> }, actor: string, factor = 1) {
{
private checkLimiter(options: Limiter.LimiterOption): Promise<Limiter.LimiterInfo> {
return new Promise<Limiter.LimiterInfo>((resolve, reject) => {
new Limiter(options).get((err, info) => {
if (err) {
return reject(err);
}
resolve(info);
});
});
}
@bindThis
public async limit(limitation: IEndpointMeta['limit'] & { key: NonNullable<string> }, actor: string, factor = 1): Promise<RateLimitInfo | null> {
if (this.disabled) {
return Promise.resolve();
return null;
}
// Short-term limit
const min = new Promise<void>((ok, reject) => {
const minIntervalLimiter = new Limiter({
if (limitation.minInterval != null) {
const info = await this.checkLimiter({
id: `${actor}:${limitation.key}:min`,
duration: limitation.minInterval! * factor,
duration: limitation.minInterval * factor,
max: 1,
db: this.redisClient,
});
minIntervalLimiter.get((err, info) => {
if (err) {
return reject({ code: 'ERR', info });
}
this.logger.debug(`${actor} ${limitation.key} min remaining: ${info.remaining}`);
if (info.remaining === 0) {
return reject({ code: 'BRIEF_REQUEST_INTERVAL', info });
} else {
if (hasLongTermLimit) {
return max.then(ok, reject);
} else {
return ok();
// eslint-disable-next-line no-throw-literal
return { code: 'BRIEF_REQUEST_INTERVAL', info };
}
}
});
});
// Long term limit
const max = new Promise<void>((ok, reject) => {
const limiter = new Limiter({
if (limitation.duration != null && limitation.max != null) {
const info = await this.checkLimiter({
id: `${actor}:${limitation.key}`,
duration: limitation.duration! * factor,
max: limitation.max! / factor,
duration: limitation.duration,
max: limitation.max / factor,
db: this.redisClient,
});
limiter.get((err, info) => {
if (err) {
return reject({ code: 'ERR', info });
}
this.logger.debug(`${actor} ${limitation.key} max remaining: ${info.remaining}`);
if (info.remaining === 0) {
return reject({ code: 'RATE_LIMIT_EXCEEDED', info });
} else {
return ok();
}
});
});
const hasShortTermLimit = typeof limitation.minInterval === 'number';
const hasLongTermLimit =
typeof limitation.duration === 'number' &&
typeof limitation.max === 'number';
if (hasShortTermLimit) {
return min;
} else if (hasLongTermLimit) {
return max;
} else {
return Promise.resolve();
// eslint-disable-next-line no-throw-literal
return { code: 'RATE_LIMIT_EXCEEDED', info };
}
}
return null;
}
}

View File

@ -73,10 +73,9 @@ export class SigninApiService {
return { error };
}
try {
// not more than 1 attempt per second and not more than 10 attempts per hour
await this.rateLimiterService.limit({ key: 'signin', duration: 60 * 60 * 1000, max: 10, minInterval: 1000 }, getIpHash(request.ip));
} catch (err) {
const rateLimit = await this.rateLimiterService.limit({ key: 'signin', duration: 60 * 60 * 1000, max: 10, minInterval: 1000 }, getIpHash(request.ip));
if (rateLimit != null) {
reply.code(429);
return {
error: {