ntfy/server/visitor.go

94 lines
2.1 KiB
Go
Raw Normal View History

2021-11-01 19:21:38 +00:00
package server
import (
2021-12-25 14:15:05 +00:00
"errors"
2021-11-01 19:21:38 +00:00
"golang.org/x/time/rate"
2021-11-01 20:39:40 +00:00
"heckel.io/ntfy/util"
2021-11-01 19:21:38 +00:00
"sync"
"time"
)
const (
2021-12-23 23:03:04 +00:00
// visitorExpungeAfter defines how long a visitor is active before it is removed from memory. This number
// has to be very high to prevent e-mail abuse, but it doesn't really affect the other limits anyway, since
// they are replenished faster (typically).
visitorExpungeAfter = 24 * time.Hour
2021-11-01 19:21:38 +00:00
)
2021-12-25 14:15:05 +00:00
var (
errVisitorLimitReached = errors.New("limit reached")
)
2021-11-01 19:21:38 +00:00
// visitor represents an API user, and its associated rate.Limiter used for rate limiting
type visitor struct {
2021-12-19 03:02:36 +00:00
config *Config
2021-12-24 14:01:29 +00:00
ip string
2021-12-23 23:03:04 +00:00
requests *rate.Limiter
2022-01-03 23:55:08 +00:00
emails *rate.Limiter
2022-01-12 23:52:07 +00:00
subscriptions util.Limiter
2022-01-13 02:24:48 +00:00
bandwidth util.Limiter
2021-11-01 19:21:38 +00:00
seen time.Time
mu sync.Mutex
}
2021-12-24 14:01:29 +00:00
func newVisitor(conf *Config, ip string) *visitor {
2021-11-01 19:21:38 +00:00
return &visitor{
2021-11-01 20:39:40 +00:00
config: conf,
2021-12-24 14:01:29 +00:00
ip: ip,
2021-12-23 23:03:04 +00:00
requests: rate.NewLimiter(rate.Every(conf.VisitorRequestLimitReplenish), conf.VisitorRequestLimitBurst),
2022-01-03 23:55:08 +00:00
emails: rate.NewLimiter(rate.Every(conf.VisitorEmailLimitReplenish), conf.VisitorEmailLimitBurst),
2022-01-12 23:52:07 +00:00
subscriptions: util.NewFixedLimiter(int64(conf.VisitorSubscriptionLimit)),
2022-01-13 02:24:48 +00:00
bandwidth: util.NewBytesLimiter(conf.VisitorAttachmentDailyBandwidthLimit, 24*time.Hour),
seen: time.Now(),
2021-11-01 19:21:38 +00:00
}
}
2021-12-24 14:01:29 +00:00
func (v *visitor) IP() string {
return v.ip
}
2021-11-01 19:21:38 +00:00
func (v *visitor) RequestAllowed() error {
2021-12-23 23:03:04 +00:00
if !v.requests.Allow() {
2021-12-25 14:15:05 +00:00
return errVisitorLimitReached
2021-12-23 23:03:04 +00:00
}
return nil
}
func (v *visitor) EmailAllowed() error {
if !v.emails.Allow() {
2021-12-25 14:15:05 +00:00
return errVisitorLimitReached
2021-11-01 19:21:38 +00:00
}
return nil
}
2021-12-25 14:15:05 +00:00
func (v *visitor) SubscriptionAllowed() error {
2021-11-01 19:21:38 +00:00
v.mu.Lock()
defer v.mu.Unlock()
if err := v.subscriptions.Allow(1); err != nil {
2021-12-25 14:15:05 +00:00
return errVisitorLimitReached
2021-11-01 19:21:38 +00:00
}
return nil
}
func (v *visitor) RemoveSubscription() {
v.mu.Lock()
defer v.mu.Unlock()
v.subscriptions.Allow(-1)
2021-11-01 19:21:38 +00:00
}
func (v *visitor) Keepalive() {
v.mu.Lock()
defer v.mu.Unlock()
v.seen = time.Now()
}
2022-01-13 02:24:48 +00:00
func (v *visitor) BandwidthLimiter() util.Limiter {
return v.bandwidth
2022-01-12 23:52:07 +00:00
}
2021-11-01 19:21:38 +00:00
func (v *visitor) Stale() bool {
v.mu.Lock()
defer v.mu.Unlock()
return time.Since(v.seen) > visitorExpungeAfter
}