54 lines
1.1 KiB
Ruby
54 lines
1.1 KiB
Ruby
|
require_dependency 'rate_limiter/limit_exceeded'
|
||
|
require_dependency 'rate_limiter/on_create_record'
|
||
|
|
||
|
# A redis backed rate limiter.
|
||
|
class RateLimiter
|
||
|
|
||
|
# We don't observe rate limits in test mode
|
||
|
def self.disabled?
|
||
|
Rails.env.test?
|
||
|
end
|
||
|
|
||
|
def initialize(user, key, max, secs)
|
||
|
@user = user
|
||
|
@key = "rate-limit:#{@user.id}:#{key}"
|
||
|
@max = max
|
||
|
@secs = secs
|
||
|
end
|
||
|
|
||
|
def clear!
|
||
|
$redis.del(@key)
|
||
|
end
|
||
|
|
||
|
def can_perform?
|
||
|
return true if RateLimiter.disabled?
|
||
|
return true if @user.has_trust_level?(:moderator)
|
||
|
|
||
|
result = $redis.get(@key)
|
||
|
return true if result.blank?
|
||
|
return true if result.to_i < @max
|
||
|
false
|
||
|
end
|
||
|
|
||
|
def performed!
|
||
|
return if RateLimiter.disabled?
|
||
|
return if @user.has_trust_level?(:moderator)
|
||
|
|
||
|
result = $redis.incr(@key).to_i
|
||
|
$redis.expire(@key, @secs) if result == 1
|
||
|
if result > @max
|
||
|
|
||
|
# In case we go over, clamp it to the maximum
|
||
|
$redis.decr(@key)
|
||
|
|
||
|
raise LimitExceeded.new($redis.ttl(@key))
|
||
|
end
|
||
|
end
|
||
|
|
||
|
def rollback!
|
||
|
return if RateLimiter.disabled?
|
||
|
$redis.decr(@key)
|
||
|
end
|
||
|
|
||
|
end
|